Project Mockingbird – Where Mainstream Media Corruption Roots Took Hold

Project Mockingbird – Where Mainstream Media Corruption Roots Took Hold

Operation Mockingbird is a large-scale program of the United States Central Intelligence Agency (CIA) that began in the early 1950s and attempted to manipulate news media for propaganda purposes. It funded student and cultural organizations and magazines as front organizations.

Operation Mockingbird

According to writer Deborah Davis, Operation Mockingbird recruited leading American journalists into a propaganda network and oversaw the operations of front groups. CIA support of front groups was exposed after a 1967 Ramparts magazine article reported that the National Student Association received funding from the CIA. In the 1970s, Congressional investigations and reports also revealed Agency connections with journalists and civic groups. None of these reports, however, mentions by name an Operation Mockingbird coordinating or supporting these activities.

Project Mockingbird is mentioned in the CIA Family Jewels report, compiled in the mid-1970s. According to the declassified version of the report released in 2007, Project Mockingbird involved the wire-tapping of two American journalists for several months in the early 1960s.

 History

In the early years of the Cold War, efforts were made by the governments of the Soviet Union and the United States to use media companies to influence public opinion internationally. Reporter Deborah Davis claimed in her 1979 biography of Katharine Graham, owner of The Washington Post, (Katharine the Great), that the CIA ran an “Operation Mockingbird” during this time.[2] Davis claimed that the International Organization of Journalists was created as a Communist front organization and “received money from Moscow and controlled reporters on every major newspaper in Europe, disseminating stories that promoted the Communist cause.”[3] Davis claimed that Frank Wisner, director of the Office of Policy Coordination (a covert operations unit created in 1948 by the United States National Security Council) had created Operation Mockingbird in response to the International Organization of Journalists, recruiting Phil Graham from The Washington Post to run the project within the industry. According to Davis, “By the early 1950s, Wisner ‘owned’ respected members of The New York Times, Newsweek, CBS and other communications vehicles.”[4] Davis claimed that after Cord Meyer joined the CIA in 1951, he became Operation Mockingbird’s “principal operative.”[5]

In a 1977 Rolling Stone magazine article, “The CIA and the Media,” reporter Carl Bernstein wrote that by 1953, CIA Director Allen Dulles oversaw the media network, which had major influence over 25 newspapers and wire agencies.[6] Its usual modus operandi was to place reports, developed from CIA-provided intelligence, with cooperating or unwitting reporters. Those reports would be repeated or cited by the recipient reporters and would then, in turn, be cited throughout the media wire services. These networks were run by people with well-known liberal but pro-American-big-business and anti-Soviet views, such as William S. Paley (CBS), Henry Luce (Time and Life), Arthur Hays Sulzberger (The New York Times), Alfred Friendly (managing editor of The Washington Post), Jerry O’Leary (The Washington Star), Hal Hendrix (Miami News), Barry Bingham, Sr. (Louisville Courier-Journal), James S. Copley (Copley News Services) and Joseph Harrison (The Christian Science Monitor).[6]

Congressional investigations

After the Watergate scandal in 1972–1974, the U.S. Congress became concerned over possible presidential abuse of the CIA. This concern reached its height when reporter Seymour Hersh published an exposé of CIA domestic surveillance in 1975.[7] Congress authorized a series of Congressional investigations into Agency activities from 1975 to 1976. A wide range of CIA operations were examined in these investigations, including CIA ties with journalists and numerous private voluntary organizations. None of the resulting reports, however, refer to an Operation Mockingbird.

The most extensive discussion of CIA relations with news media from these investigations is in the Church Committee‘s final report, published in April 1976. The report covered CIA ties with both foreign and domestic news media.

For foreign news media, the report concluded that:

The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.[8]

For domestic media, the report states:

Approximately 50 of the [Agency] assets are individual American journalists or employees of U.S. media organizations. Of these, fewer than half are “accredited” by U.S. media organizations … The remaining individuals are non-accredited freelance contributors and media representatives abroad … More than a dozen United States news organizations and commercial publishing houses formerly provided cover for CIA agents abroad. A few of these organizations were unaware that they provided this cover.[8]

CIA response

Prior to the release of the Church report, the CIA had already begun restricting its use of journalists. According to the report, former CIA director William Colby informed the committee that in 1973 he had issued instructions that “As a general policy, the Agency will not make any clandestine use of staff employees of U.S. publications which have a substantial impact or influence on public opinion.”[9]

In February 1976, Director George H. W. Bush announced an even more restrictive policy: “effective immediately, CIA will not enter into any paid or contractual relationship with any full-time or part-time news correspondent accredited by any U.S. news service, newspaper, periodical, radio or television network or station.[10]

By the time the Church Committee Report was completed, all CIA contacts with accredited journalists had been dropped. The Committee noted, however, that “accredited correspondent” meant the ban was limited to individuals “formally authorized by contract or issuance of press credentials to represent themselves as correspondents” and that non-contract workers who did not receive press credentials, such as stringers or freelancers, were not included.

 

Mocking Us Now, But it’s Not Their First Rodeo

Mocking Us Since 1968

THE NEWS BENDERS

 

Other coverage

In a 1977 Rolling Stone magazine article, “The CIA and the Media,” reporter Carl Bernstein claims that the Church Committee report “covered up” CIA relations with news media, and names a number of journalists who, he says, worked with the CIA.[11] Like the Church Committee report, however, Bernstein does not refer to any Operation Mockingbird.

 

Project Mockingbird

In 2007 a CIA report was declassified that is titled the Family Jewels.[12] Compiled by the CIA in 1973, it refers to a Project Mockingbird and describes a wiretap of journalists. The report was compiled at the request of then CIA director James R. Schlesinger.

According to the report:

Project Mockingbird, a telephone intercept activity, was conducted between 12 March 1963 and 15 June 1963, and targeted two Washington based newsmen who, at the time, had been publishing news articles based on, and frequently quoting, classified materials of this Agency and others, including Top Secret and Special Intelligence.[13]

The wiretap was authorized by CIA director John A. McCone, “in coordination with the Attorney General (Mr. Robert Kennedy), the Secretary of Defense (Mr. Robert McNamara), and the director of the Defense Intelligence Agency (Gen. Joseph Carroll).” [13]

An internal CIA biography of McCone by CIA Chief Historian David Robarge, made public under an FOIA request, identified the two reporters as Robert S. Allen and Paul Scott.[14] Their syndicated column, “The Allen-Scott Report,” appeared in as many as three hundred papers at the height of its popularity.[15]

See also

Historical studies of the CIA

 

 The ‘Revolving Door’ Concept
Politics to Private
And Back Again
Vizualized

References^ Armonk, NY (2004). “MOCKINGBIRD, Project”. Encyclopedia of intelligence and counterintelligence (First ed.). Routledge. p. 432. ISBN 0765680688. A Cold War-era CIA propaganda campaign, Project MOCKINGBIRD was begun in the late 1940s under Frank Wisner, director of the Office of Policy Coordination. Project MOCKINGBIRD sought to manipulate media coverage of the Cold War by recruiting foreign and domestic journalists to serve as clandestine propaganda agents for the United States. Enjoying mixed success in the late 1950s and 1960s, the program was ended in the 1970s due to mounting popular opposition to the CIA’s cover operations and domestic activities.

  1. ^ Davis, Deborah (1979). Katharine The Great: Katharine Graham and The Washington Post. Harcourt Brace Jovanovich. ISBN 0151467846.
  2. ^ Davis 138-140
  3. ^ Deborah Davis (1979). Katharine the Great. pp. 137–138.
  4. ^ Deborah Davis (1979). Katharine the Great. p. 226.
  5. Jump up to:a b Carl Bernstein (20 October 1977). “CIA and the Media”. Rolling Stone Magazine.
  6. ^ The surveillance, known as Operation CHAOS, was aimed at determining whether American opposition to the Vietnam war was being financed or manipulated by foreign governments. Ranelagh, 571-575.
  7. Jump up to:a b Church Committee Final Report, Vol 1: Foreign and Military Intelligence, p. 455
  8. ^ Church Committee Final Report, Vol 1: Foreign and Military Intelligence, p. 196
  9. ^ Church Committee Final Report, Vol 1: Foreign and Military Intelligence, p. 454
  10. ^ The article, The CIA and the Media”, is available on Bernstein’s website.
  11. ^ “Family Jewels”FOIA Electronic Reading Room. Central Intelligence Agency. Retrieved 2016-12-14.. A searchable pdf of the report is available at the website of George Washington University’s National Security Archive.
  12. Jump up to:a b “Family Jewels” Report, p. 22
  13. ^ Robarge, David (2005). John McCone as Director of Central Intelligence, 1961-1965 (part 2). Center for the Study of Intelligence. pp. 328–329. Retrieved 2016-02-14.
  14. ^ “Long-ago wiretap inspires a battle with the CIA for more information”Washington Post. Retrieved 2016-12-12.

Insider Leaks Statement: Facebook Was NOT Created By Mark Zuckerberg!

Insider Leaks Statement: Facebook Was NOT Created By Mark Zuckerberg!

Definitely worth a listen!  We all know that Facebook had some shady beginnings.. stolen code.. angel investment via outed CIA ‘front company’ In-Q-Tel, and it goes on..  What if Zuck really was just the chosen puppet leader of what would ultimately be the worlds largest ‘voluntary citizen dossier’?  Give it a listen and decide for yourself.  These statements certainly seem to ring true with plenty of background info to give reasonable merit.

     Highlights:

    • Mark’s real name is not even Zuckerberg.
    • Mark was chosen ahead of time and ‘placed’ at Harvard to fit the story.
    • Mark did not create the Facebook brand name nor did he write any code.
    • Mark has ‘handlers’ that dictated (and still do) his every move.
    • Mark’s lack of any moral compass made him the perfect figure-head.
    • Mark is the just the face of a much bigger agenda at work.

    Interesting ‘Top Comment’

    ” So, Zuckerberg’s Harvard professor, James P. Chandler, is one in the same patent attorney who stole Michael McKibben’s Leader Technology ideas that he was supposed to help get a patent and instead STOLE the information! WOW, all these deep stater’s are totally intertwined, like a huge cancer. How do you kill a cancer? STARVE IT! “

    How to identify CIA ‘Limited Hangout Op’? The Snowden Example

    How to identify CIA ‘Limited Hangout Op’? The Snowden Example

    How to identify CIA  The operations of secret intelligence agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations. There is ample reason to believe that the case of Edward Joseph Snowden fits into this pattern. We are likely dealing here with a limited hangout operation, in which carefully selected and falsified documents and other materials are deliberately revealed by an insider who pretends to be a fugitive rebelling against the excesses of some oppressive or dangerous government agency. But the revelations turn out to have been prepared with a view to shaping the public consciousness in a way which is advantageous to the intelligence agency involved. At the same time, gullible young people can be duped into supporting a personality cult of the leaker, more commonly referred to as a “whistleblower.”

    A further variation on the theme can be the attempt of the sponsoring intelligence agency to introduce their chosen conduit, now posing as a defector, into the intelligence apparatus of a targeted foreign government. In this case, the leaker or whistleblower attains the status of a triple agent. Any attempt to educate public opinion about the dynamics of limited hangout operations inevitably collides with the residue left in the minds of millions by recent successful examples of this technique. It will be hard for many to understand Snowden, precisely because they will insist on seeing him as the latest courageous example in a line of development which includes Daniel Ellsberg and Julian Assange, both still viewed by large swaths of naïve opinion as authentic challengers of oppressive government. This is because the landmark limited hangout operation at the beginning of the current post-Cold War era was that of Daniel Ellsberg and the Pentagon papers, which laid the groundwork for the CIA’s Watergate attack on the Nixon administration, and more broadly, on the office of the presidency itself. More recently, we have had the case of Assange and Wikileaks.

    Using these two cases primarily, we can develop a simple typology of the limited hangout operation which can be of significant value to those striving to avoid the role of useful idiots amidst the current cascade of whistleblowers and limited hangout artists. In this analysis, we should also recall that limited hangouts have been around for a very long time. In 1620 Fra Paolo Sarpi, the dominant figure of the Venetian intelligence establishment of his time, advised the Venetian senate that the best way to defeat anti-Venetian propaganda was indirectly. He recommended the method of saying something good about a person or institution while pretending to say something bad. An example might be criticizing a bloody dictator for beating his dog – the real dimensions of his crimes are thus totally underplayed.

    Limited hangout artists are instant media darlings

    The most obvious characteristic of the limited hangout operative is that he or she immediately becomes the darling of the controlled corporate media. In the case of Daniel Ellsberg, his doctored set of Pentagon papers were published by the New York Times, the Washington Post, the Boston Globe, and eventually by a consortium totaling seventeen corporate newspapers. These press organs successfully argued the case for publication all the way to the United States Supreme Court, where they prevailed against the Nixon administration. Needless to say, surviving critics of the Warren Commission, and more recent veterans of the 9/11 truth movement, and know very well that this is emphatically not the treatment reserved for messengers whose revelations are genuinely unwelcome to the Wall Street centered US ruling class. These latter are more likely to be slandered, vilified and dragged through the mud, or, even more likely, passed over in complete silence and blacked out. In extreme cases, they can be kidnapped, renditioned or liquidated.

    Cass Sunstein present at the creation of Wikileaks

    As for Assange and Wikileaks, the autumn 2010 document dump was farmed out in advance to five of the most prestigious press organs in the world, including the New York Times, the London Guardian, El Pais of Madrid, Der Spiegel of Hamburg, and Le Monde of Paris. This was the Assange media cartel, made up of papers previously specialized in discrediting 9/11 critics and doubters. But even before the document dumps had begun, Wikileaks had received a preemptive endorsement from none other than the notorious totalitarian Cass Sunstein, later an official of the Obama White House, and today married to Samantha Power, the author of the military coup that overthrew Mubarak and currently Obama’s pick for US ambassador to the United Nations. Sunstein is infamous for his thesis that government agencies should conduct covert operations using pseudo-independent agents of influence for the “cognitive infiltration of extremist groups” – meaning of those who reject in the establishment view of history and reality.Sunstein’s article entitled “Brave New WikiWorld” was published in the Washington Post of February 24, 2007, and touted the capabilities of Wikileaks for the destabilization of China.

    Perhaps the point of Ed Snowden’s presence in Hong Kong is to begin re-targeting these capabilities back towards the original anti-Chinese plan. Snowden has already become a media celebrity of the first magnitude. His career was launched by the US left liberal Glenn Greenwald, now writing for the London Guardian, which expresses the viewpoints of the left wing of the British intelligence community. Thus, the current scandal is very much Made in England, and may benefit from inputs from the British GCHQ of Cheltenham, the Siamese twin of the NSA at Fort Meade, Maryland. During the days of his media debut, it was not uncommon to see a controlled press organ like CNN dedicating one third of every broadcast hour of air time to the birth, life, and miracles of Ed Snowden.

    Another suspicious and tell-tale endorsement for Snowden comes from the former State Department public diplomacy asset Norman Solomon. Interviewed on RT, Solomon warmly embraced the Snowden Project and assured his viewers that the NSA material dished up by the Hong Kong defector used reliable and authentic. Solomon was notorious ten years ago as a determined enemy of 9/11 truth, acting as a border guard in favor of the Bush administration/neocon theory of terrorism.

    Limited hangouts contain little that is new

    Another important feature of the limited hangout operation if that the revelations often contain nothing new, but rather repackage old wine in new bottles. In the case of Ellsberg’s Pentagon Papers, very little was revealed which was not already well known to a reader of Le Monde or the dispatches of Agence France Presse. Only those whose understanding of world affairs had been filtered through the Associated Press, CBS News, the New York Times, and the Washington Post found any of Ellsberg’s material a surprise. Of course, there was method in Ellsberg’s madness. The Pentagon papers allegedly derived from an internal review of the decision-making processes leading to the Vietnam War, conducted after 1967-68 under the supervision of Morton Halperin and Leslie Gelb. Ellsberg, then a young RAND Corporation analyst and militant warmonger, was associated with this work.

    Upon examination, we find that the Pentagon papers tend to cover up such CIA crimes as the mass murder mandated under Operation Phoenix, and the massive CIA drug running associated with the proprietary airline Air America. Rather, when atrocities are in question, the US Army generally receives the blame. Politicians in general, and President John F. Kennedy in particular, are portrayed in a sinister light – one might say demonized. No insights whatever into the Kennedy assassination are offered. This was a smelly concoction, and it was not altogether excluded that the radicalized elements of the Vietnam era might have carried the day in denouncing the entire package as a rather obvious fabrication. But a clique around Noam Chomsky and Howard Zinn loudly intervened to praise the quality of the exposé and to lionize Ellsberg personally as a new culture hero for the Silent Generation. From that moment on, the careers of Chomsky and Zinn soared. Pentagon papers skeptics, like the satirical comedian Mort Sahl, a supporter of the Jim Garrison investigation in New Orleans and a critic of the Warren Commission, faced the marginalization of their careers.

    Notice also that the careers of Morton Halperin and Leslie Gelb positively thrived after they entrusted the Pentagon papers to Ellsberg, who revealed them. Ellsberg was put on trial in 1973, but all charges were dismissed after several months because of prosecutorial misconduct. Assange lived like a lord for many months in the palatial country house of an admirer in the East of England, and is now holed up in the Ecuadorian Embassy in London. He spent about 10 days in jail in December 2010.Assange first won credibility for Wikileaks with some chum in the form of a shocking film showing a massacre perpetrated by US forces in Iraq with the aid of drones. The massacre itself and the number of victims were already well known, so Assange was adding only the graphic emotional impact of witnessing the atrocity firsthand.

    Limited hangouts reveal nothing about big issues like JFK, 9/11

    Over the past century, there are certain large-scale covert operations which cast a long historical shadow, determining to some extent the framework in which subsequent events occur. These include the Sarajevo assassinations of 1914, the assassination of Rasputin in late 1916, Mussolini’s 1922 march on Rome, Hitler’s seizure of power in 1933, the assassination of French Foreign Minister Barthou in 1934, the assassination of President Franklin D. Roosevelt in 1945, in 1963 Kennedy assassination, and 9/11. A common feature of the limited hangout operations is that they offer almost no insights into these landmark events. In the Pentagon Papers, the Kennedy assassination is virtually a nonexistent event about which we learn nothing. As already noted, the principal supporters of Ellsberg were figures like Chomsky, whose hostility to JFK and profound disinterest in critiques of the Warren Commission were well-known.

    As for Assange, he rejects any further clarification of 9/11. In July 2010, Assange told Matthew Bell of the Belfast Telegraph: “I’m constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud.” This is on top of Cass Sunstein’s demand for active covert measures to suppress and disrupt inquiries into operations like 9/11. Snowden’s key backers Glenn Greenwald and Norman Solomon have both compiled impressive records of evasion on 9/11 truth, with Greenwald specializing in the blowback theory.

    The Damascus road conversions of limited hangout figures

    Daniel Ellsberg started his career as a nuclear strategist of the Dr. Strangelove type working for the RAND Corporation. He worked in the Pentagon as an aide to US Secretary of Defense Robert McNamara. He then went to Vietnam, where he served as a State Department civilian assistant to CIA General Edward Lansdale. In 1967, he was back at RAND to begin the preparation of what would come to be known as the Pentagon papers. Ellsberg has claimed that his Damascus Road conversion from warmonger to peace angel occurred when he heard a speech from a prison-bound draft resister at Haverford College in August 1969. After a mental breakdown, Ellsberg began taking his classified documents to the office of Senator Edward Kennedy and ultimately to the New York Times. Persons who believe this fantastic story may be suffering from terminal gullibility.

    In the case of Assange, it is harder to identify such a moment of conversion. Assange spent his childhood in the coils of MK Ultra, a complex of Anglo-American covert operations designed to investigate and implement mind control through the use of psychopharmaca and other means. Assange was a denizen of the Ann Hamilton-Byrne cult, in which little children that were subjected to aversive therapy involving LSD and other heavy-duty drugs. Assange spent his formative years as a wandering nomad with his mother incognito because of her involvement in a custody dispute. The deracinated Assange lived in 50 different towns and attended 37 different schools. By the age of 16, the young nihilist was active as a computer hacker using the screen name “Mendax,” meaning quite simply “The Liar.” (Assange’s clone Snowden uses the more marketable codename of “Verax,” the truth teller.) Some of Assange’s first targets were Nortel and US Air Force offices in the Pentagon. Assange’s chief mentor became John Young of Cryptome, who in 2007 denounced Wikileaks as a CIA front.

    Snowden’s story, as widely reported, goes like this: he dropped out of high school and also dropped out of a community college, but reportedly was nevertheless later able to command a salary of between $120,000 and $200,000 per year; he claims this is because he is a computer wizard. He enlisted in the US Army in May 2004, and allegedly hoped to join the special forces and contribute to the fight for freedom in Iraq. He then worked as a low-level security guard for the National Security Agency, and then went on to computer security at the CIA, including a posting under diplomatic cover in Switzerland. He moved on to work as a private contractor for the NSA at a US military base in Japan. His last official job was for the NSA at the Kunia Regional SIGINT Operations Center in Hawaii. In May 2013, he is alleged to have been granted medical leave from the NSA in Hawaii to get treatment for epilepsy. He fled to Hong Kong, and made his revelations with the help of Greenwald and a documentary filmmaker Laura Poitras. Snowden voted for the nominally anti-war, ultra-austerity “libertarian” presidential candidate Ron Paul, and gave several hundred dollars to Paul’s campaign.

    Snowden, like Ellsberg, thus started off as a warmonger but later became more concerned with the excesses of the Leviathan state. Like Assange, he was psychologically predisposed to the world of computers and cybernetics. The Damascus Road shift from militarist to civil libertarian remains unexplained and highly suspicious. Snowden is also remarkable for the precision of his timing. His first revelations, open secrets though they were, came on June 5, precisely today when the rebel fortress of Qusayr was liberated by the Syrian army and Hezbollah. At this point, the British and French governments were screaming at Obama that it was high time to attack Syria. The appearance of Snowden’s somewhat faded material in the London Guardian was the trigger for a firestorm of criticism against the Obama regime by the feckless US left liberals, who were thus unwittingly greasing the skids for a US slide into a general war in the Middle East.

    More recently, Snowden came forward with allegations that the US and the British had eavesdropped on participants in the meeting of the G-20 nations held in Britain four years ago. This obviously put Obama on the defensive just as Cameron and Hollande were twisting his arm to start the Syrian adventure. By attacking the British GCHQ at Cheltenham, Britain’s equivalent to the NSA, perhaps Snowden was also seeking to obfuscate the obvious British sponsorship of his revelations. Stories about Anglo Americans spying on high profile guests are as old as the hills, and have included a British frogman who attempted an underwater investigation of the Soviet cruiser that brought party leader N. S. Khrushchev for a visit in the 1950s. Snowden has also accused the NSA of hacking targets in China — again, surely no surprise to experienced observers, but guaranteed to increase Sino-American tensions. As time passes, Snowden may emerge as more and more of a provocateur between Washington and Beijing.

    Limited hangouts prepare large covert operations

    Although, as we have seen, limited hangouts rarely illuminate the landmark covert operations which attempt to define an age, limited hangouts themselves do represent the preparation for future covert operations. In the case of the Pentagon papers, this and other leaks during the Indo-Pakistani Tilt crisis were cited by Henry Kissinger in his demand that President Richard Nixon take countermeasures to restore the integrity of state secrets. Nixon foolishly authorized the creation of a White House anti-leak operation known as the Plumbers. The intelligence community made sure that the Plumbers operation was staffed by their own provocateurs, people who never were loyal to Nixon but rather took their orders from Langley. Here we find the already infamous CIA agent Howard Hunt, the CIA communications expert James McCord, and the FBI operative G. Gordon Liddy. These provocateurs took special pains to get arrested during an otherwise pointless break-in at the headquarters of the Democratic National Committee in the summer of 1972. Nixon could easily have disavowed the Plumbers and thrown this gaggle of agent provocateurs to the wolves, but he instead launched a cover up. Bob Woodward of the Washington Post, equipped with a top secret security clearance from the Office of Naval Intelligence, then began publicizing the story. The rest is history, and the lasting heritage has been a permanent weakening of the office of the presidency and the strengthening of the worst oligarchical tendencies.

    Assange’s Wikileaks document dump triggered numerous destabilizations and coups d’état across the globe. Not one US, British, or Israeli covert operation or politician was seriously damaged by this material. The list of those impacted instead bears a striking resemblance to the CIA enemies’ list: the largest group of targets were Arab leaders slated for immediate ouster in the wave of “Arab Spring.” Here we find Ben Ali of Tunisia, Qaddafi of Libya, Mubarak of Egypt, Saleh of Yemen, and Assad of Syria. The US wanted to replace Maliki with Allawi as prime minister of Iraq, so the former was targeted, as was the increasingly independent Karzai of Afghanistan.

    Perennial targets of the CIA included Rodriguez Kirchner of Argentina, Berlusconi of Italy, and Putin of Russia. Berlusconi soon fell victim to a coup organized through the European Central Bank, while his friend Putin was able to stave off a feeble attempt at color revolution in early 2012. Mildly satiric jabs at figures like Merkel of Germany and Sarkozy of France were included primarily as camouflage. Assange thus had a hand in preparing one of the largest destabilization campaigns mounted by Anglo-American intelligence since 1968, or perhaps even 1848. If the Snowden operation can help coerce the vacillating and reluctant Obama to attack Syria, our new autistic hero may claim credit for starting a general war in the Middle East, and perhaps even more. If Snowden can further poison relations between United States and China, the world historical significance of his provocations will be doubly assured. But none of this can occur unless he finds vast legions of eager dupes ready to fall for his act. We hope he won’t.

    WT/HN

     

    via PressTV

    The Media Is Focusing On the WRONG Senate Torture Report

    The Media Is Focusing On the WRONG Senate Torture Report

    The Big Story Torture Everyone Is Missing Senate Torture Report

    While the torture report released by the Senate Intelligence Committee is very important, it doesn’t address the big scoop regarding torture.

    Instead, it is the Senate Armed Services Committee’s report that dropped the big bombshell regarding the U.S.  torture program.

    Senator Levin, commenting on a Armed Services Committee’s report on torture in 2009, explained:

    The techniques are based on tactics used by Chinese Communists against American soldiers during the Korean War for the purpose of eliciting FALSE confessions for propaganda purposes. Techniques used in SERE training include stripping trainees of their clothing, placing them in stress positions, putting hoods over their heads, subjecting them to face and body slaps, depriving them of sleep, throwing them up against a wall, confining them in a small box, treating them like animals, subjecting them to loud music and flashing lights, and exposing them to extreme temperatures [and] waterboarding.

    McClatchy filled in important details:

    Former senior U.S. intelligence official familiar with the interrogation issue said that Cheney and former Defense Secretary Donald H. Rumsfeld demanded that the interrogators find evidence of al Qaida-Iraq collaboration

    For most of 2002 and into 2003, Cheney and Rumsfeld, especially, were also demanding proof of the links between al Qaida and Iraq that (former Iraqi exile leader Ahmed) Chalabi and others had told them were there.”

    It was during this period that CIA interrogators waterboarded two alleged top al Qaida detainees repeatedly — Abu Zubaydah at least 83 times in August 2002 and Khalid Sheik Muhammed 183 times in March 2003 — according to a newly released Justice Department document…

    When people kept coming up empty, they were told by Cheney’s and Rumsfeld’s people to push harder,” he continued.”  Cheney’s and Rumsfeld’s people were told repeatedly, by CIA . . . and by others, that there wasn’t any reliable intelligence that pointed to operational ties between bin Laden and Saddam . . .

    A former U.S. Army psychiatrist, Maj. Charles Burney, told Army investigators in 2006 thatinterrogators at the Guantanamo Bay, Cuba, detention facility were under “pressure” to produce evidence of ties between al Qaida and Iraq.

    “While we were there a large part of the time we were focused on trying to establish a link between al Qaida and Iraq and we were not successful in establishing a link between al Qaida and Iraq,” Burney told staff of the Army Inspector General. “The more frustrated people got in not being able to establish that link . . . there was more and more pressure to resort to measures that might produce more immediate results.”

    “I think it’s obvious that the administration was scrambling then to try to find a connection, a link (between al Qaida and Iraq),” [Senator] Levin said in a conference call with reporters. “They made out links where they didn’t exist.”

    Levin recalled Cheney’s assertions that a senior Iraqi intelligence officer had met Mohammad Atta, the leader of the 9/11 hijackers, in the Czech Republic capital of Prague just months before the attacks on the World Trade Center and the Pentagon.

    The FBI and CIA found that no such meeting occurred.

    The Washington Post reported the same year:

    Despite what you’ve seen on TV, torture is really only good at one thing: eliciting false confessions. Indeed, Bush-era torture techniques, we now know, were cold-bloodedly modeled after methods used by Chinese Communists to extract confessions from captured U.S. servicemen that they could then use for propaganda during the Korean War.

    So as shocking as the latest revelation in a new Senate Armed Services Committee report may be, it actually makes sense — in a nauseating way. The White House started pushing the use of torture not when faced with a “ticking time bomb” scenario from terrorists, but when officials in 2002 were desperately casting about for ways to tie Iraq to the 9/11 attacks — in order to strengthen their public case for invading a country that had nothing to do with 9/11 at all.

    ***

    Gordon Trowbridge writes for the Detroit News: “Senior Bush administration officials pushed for the use of abusive interrogations of terrorism detainees in part to seek evidence to justify the invasion of Iraq, according to newly declassified information discovered in a congressional probe.

    Colin Powell’s former chief of staff (Colonel Larry Wilkerson) wrote in 2009 that the Bush administration’s “principal priority for intelligence was not aimed at pre-empting another terrorist attack on the U.S. but discovering a smoking gun linking Iraq and al-Qaeda.”

    Indeed, one of the two senior instructors from the Air Force team which taught U.S. servicemen how to resist torture by foreign governments when used to extract false confessions has blown the whistle on the true purpose behind the U.S. torture program.

    As Truthout reported:

    [Torture architect] Jessen’s notes were provided to Truthout by retired Air Force Capt. Michael Kearns, a “master” SERE instructor and decorated veteran who has previously held high-ranking positions within the Air Force Headquarters Staff and Department of Defense (DoD).

    ***

    The Jessen notes clearly state the totality of what was being reverse-engineered – not just ‘enhanced interrogation techniques,’ but an entire program of exploitation of prisoners using torture as a central pillar,” he said. “What I think is important to note, as an ex-SERE Resistance to Interrogation instructor, is the focus of Jessen’s instruction. It is EXPLOITATION, not specifically interrogation. And this is not a picayune issue, because if one were to ‘reverse-engineer’ a course on resistance to exploitation then what one would get is a plan to exploit prisoners, not interrogate them. The CIA/DoD torture program appears to have the same goals as the terrorist organizations or enemy governments for which SV-91 and other SERE courses were created to defend against: the full exploitation of the prisoner in his intelligence, propaganda, or other needs held by the detaining power, such as the recruitment of informers and double agents. Those aspects of the US detainee program have not generally been discussed as part of the torture story in the American press.”

    In a subsequent report, Truthout notes:

    Air Force Col. Steven Kleinman, a career military intelligence officer recognized as one of the DOD’s most effective interrogators as well a former SERE instructor and director of intelligence for JPRA’s teaching academy, said ….  “This is the guidebook to getting false confessions, a system drawn specifically from the communist interrogation model that was used to generate propaganda rather than intelligence”  …. “If your goal is to obtain useful and reliable information this is not the source book you should be using.”

    Interrogators also forced detainees to take drugs … which further impaired their ability to tell the truth.

    And one of the two main architects of the torture program admitted this week on camera:

    You can get people to say anything to stop harsh interrogations if you apply them in a way that does that.

    And false confessions were, in fact, extracted.

    For example:

    And the 9/11 Commission Report was largely based on a third-hand account of what tortured detainees said, with two of the three parties in the communication being government employees. And the government went to great lengths to obstruct justice and hide unflattering facts from the Commission.

    According to NBC News:

    • Much of the 9/11 Commission Report was based upon the testimony of people who were tortured
    • At least four of the people whose interrogation figured in the 9/11 Commission Report have claimed that they told interrogators information as a way to stop being “tortured.”
    • The 9/11 Commission itself doubted the accuracy of the torture confessions, and yet kept their doubts to themselves

    Details here.

    Today, Raymond McGovern – a 27-year CIA veteran, who chaired National Intelligence Estimates and personally delivered intelligence briefings to Presidents Ronald Reagan and George H.W. Bush, their Vice Presidents, Secretaries of State, the Joint Chiefs of Staff, and many other senior government officials –provides details about one torture victim (Al-Libi) at former Newsweek and AP reporter Robert Parry’s website:

    But if it’s bad intelligence you’re after, torture works like a charm. If, for example, you wish to “prove,” post 9/11, that “evil dictator” Saddam Hussein was in league with al-Qaeda and might arm the terrorists with WMD, bring on the torturers.

    It is a highly cynical and extremely sad story, but many Bush administration policymakers wanted to invade Iraq before 9/11 and thus were determined to connect Saddam Hussein to those attacks. The PR push began in September 2002 – or as Bush’s chief of staff Andrew Card put it, “From a marketing point of view, you don’t introduce new products in August.”

    By March 2003 – after months of relentless “marketing” – almost 70 percent of Americans had been persuaded that Saddam Hussein was involved in some way with the attacks of 9/11.

    The case of Ibn al-Sheikh al-Libi, a low-level al-Qaeda operative, is illustrative of how this process worked. Born in Libya in 1963, al-Libi ran an al-Qaeda training camp in Afghanistan from 1995 to 2000. He was detained in Pakistan on Nov. 11, 2001, and then sent to a U.S. detention facility in Kandahar, Afghanistan. He was deemed a prize catch, since it was thought he would know of any Iraqi training of al-Qaeda.

    The CIA successfully fought off the FBI for first rights to interrogate al-Libi. FBI’s Dan Coleman, who “lost” al-Libi to the CIA (at whose orders, I wonder?), said, “Administration officials were always pushing us to come up with links” between Iraq and al-Qaeda.

    CIA interrogators elicited some “cooperation” from al-Libi through a combination of rough treatment and threats that he would be turned over to Egyptian intelligence with even greater experience in the torture business.

    By June 2002, al-Libi had told the CIA that Iraq had “provided” unspecified chemical and biological weapons training for two al-Qaeda operatives, an allegation that soon found its way into other U.S. intelligence reports. Al-Libi’s treatment improved as he expanded on his tales about collaboration between al-Qaeda and Iraq, adding that three al-Qaeda operatives had gone to Iraq “to learn about nuclear weapons.”

    Al-Libi’s claim was well received at the White House even though the Defense Intelligence Agency was suspicious.

    “He lacks specific details” about the supposed training, the DIA observed. “It is possible he does not know any further details; it is more likely this individual is intentionally misleading the debriefers. Ibn al-Shaykh has been undergoing debriefs for several weeks and may be describing scenarios to the debriefers that he knows will retain their interest.”

    Meanwhile, at the Guantanamo Bay prison in Cuba, Maj. Paul Burney, a psychiatrist sent there in summer 2002, told the Senate, “A large part of the time we were focused on trying to establish a link between al-Qaeda and Iraq and we were not successful. The more frustrated people got in not being able to establish that link … there was more and more pressure to resort to measures that might produce more immediate results.”

    ***

    President Bush relied on al-Libi’s false Iraq allegation for a major speech in Cincinnati on Oct. 7, 2002, just a few days before Congress voted on the Iraq War resolution. Bush declared, “We’ve learned that Iraq has trained al-Qaeda members in bomb making and poisons and deadly gases.”

    And Colin Powell relied on it for his famous speech to the United Nations on Feb. 5, 2003, declaring: “I can trace the story of a senior terrorist operative telling how Iraq provided training in these [chemical and biological] weapons to al-Qaeda. Fortunately, this operative is now detained, and he has told his story.”

    Al-Libi’s “evidence” helped Powell as he sought support for what he ended up calling a “sinister nexus” between Iraq and al-Qaeda, in the general effort to justify invading Iraq.

    For a while, al-Libi was practically the poster boy for the success of the Cheney/Bush torture regime; that is, until he publicly recanted and explained that he only told his interrogators what he thought would stop the torture.

    You see, despite his cooperation, al-Libi was still shipped to Egypt where he underwent more abuse, according to a declassified CIA cable from early 2004 when al-Libi recanted his earlier statements. The cable reported that al-Libi said Egyptian interrogators wanted information about al-Qaeda’s connections with Iraq, a subject “about which [al-Libi] said he knew nothing and had difficulty even coming up with a story.”

    According to the CIA cable, al-Libi said his interrogators did not like his responses and “placed him in a small box” for about 17 hours. After he was let out of the box, al-Libi was given a last chance to “tell the truth.” When his answers still did not satisfy, al-Libi says he “was knocked over with an arm thrust across his chest and fell on his back” and then was “punched for 15 minutes.”

    After Al-Libi recanted, the CIA recalled all intelligence reports based on his statements, a fact recorded in a footnote to the report issued by the 9/11 Commission. By then, however, the Bush administration had gotten its way regarding the invasion of Iraq and the disastrous U.S. occupation was well underway.

    ***

    Intensive investigations into these allegations – after the U.S. military had conquered Iraq – failed to turn up any credible evidence to corroborate these allegations. What we do know is that Saddam Hussein and Osama bin Laden were bitter enemies, with al-Qaeda considering the secular Hussein an apostate to Islam.

    Al-Libi, who ended up in prison in Libya, reportedly committed suicide shortly after he was discovered there by a human rights organization. Thus, the world never got to hear his own account of the torture that he experienced and the story that he presented and then recanted.

    Hafed al-Ghwell, a Libyan-American and a prominent critic of Muammar Gaddafi’s regime at the time of al-Libi’s death, explained to Newsweek, “This idea of committing suicide in your prison cell is an old story in Libya.”

    Paul Krugman eloquently summarized the truth about the torture used:

    Let’s say this slowly: the Bush administration wanted to use 9/11 as a pretext to invade Iraq, even though Iraq had nothing to do with 9/11. So it tortured people to make them confess to the nonexistent link.

    There’s a word for this: it’s evil.

    Torture Program Was Part of a Con Job

    As discussed above, in order to “justify” the Iraq war, top Bush administration officials pushed and insisted that interrogators use special torture methods aimed at extracting false confessions to attempt to create a false linkage between between Al Qaida and Iraq. And see this and this.

    But this effort started earlier …

    5 hours after the 9/11 attacks, Donald Rumsfeld said “my interest is to hit Saddam”.

    He also said “Go massive . . . Sweep it all up. Things related and not.”

    And at 2:40 p.m. on September 11th, in a memorandum of discussions between top administration officials, several lines below the statement “judge whether good enough [to] hit S.H. [that is, Saddam Hussein] at same time”, is the statement “Hard to get a good case.” In other words, top officials knew that there wasn’t a good case that Hussein was behind 9/11, but they wanted to use the 9/11 attacks as an excuse to justify war with Iraq anyway.

    Moreover, “Ten days after the September 11, 2001, terrorist attacks on the World Trade Center and the Pentagon, President Bush was told in a highly classified briefing that the U.S. intelligence community had no evidence linking the Iraqi regime of Saddam Hussein to the [9/11] attacks and that there was scant credible evidence that Iraq had any significant collaborative ties with Al Qaeda”.

    And a Defense Intelligence Terrorism Summary issued in February 2002 by the United States Defense Intelligence Agency cast significant doubt on the possibility of a Saddam Hussein-al-Qaeda conspiracy.

    And yet Bush, Cheney and other top administration officials claimed repeatedly for years that Saddam was behind 9/11. See this analysis. Indeed, Bush administration officials apparently swore in a lawsuitthat Saddam was behind 9/11.

    Moreover, President Bush’s March 18, 2003 letter to Congress authorizing the use of force against Iraq, includes the following paragraph:

    (2) acting pursuant to the Constitution and Public Law 107-243 is consistent with the United States and other countries continuing to take the necessary actions against international terrorists and terrorist organizations, including those nations, organizations, or persons who planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001.

    Therefore, the Bush administration expressly justified the Iraq war to Congress by representing that Iraq planned, authorized, committed, or aided the 9/11 attacks.

    Indeed, Pulitzer prize-winning journalist Ron Suskind reports that the White House ordered the CIA to forge and backdate a document falsely linking Iraq with Muslim terrorists and 9/11 … and that theCIA complied with those instructions and in fact created the forgery, which was then used to justify war against Iraq. And see this.

    Suskind also revealed that “Bush administration had information from a top Iraqi intelligence official ‘that there were no weapons of mass destruction in Iraq – intelligence they received in plenty of time to stop an invasion.’ ”

    Cheney made the false linkage between Iraq and 9/11 on many occasions.

    For example, according to Raw Story, Cheney was still alleging a connection between Iraq and the alleged lead 9/11 hijacker in September 2003 – a year after it had been widely debunked. When NBC’s Tim Russert asked him about a poll showing that 69% of Americans believed Saddam Hussein had been involved in 9/11, Cheney replied:

    It’s not surprising that people make that connection.

    And even after the 9/11 Commission debunked any connection, Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime , that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties.

    Again, the Bush administration expressly justified the Iraq war by representing that Iraq planned, authorized, committed, or aided the 9/11 attacks. See this, this, this.

    Even then-CIA director George Tenet said that the White House wanted to invade Iraq long before 9/11, and inserted “crap” in its justifications for invading Iraq.

    Former Treasury Secretary Paul O’Neill – who sat on the National Security Council – also says that Bush planned the Iraq war before 9/11.

    Top British officials say that the U.S. discussed Iraq regime change even before Bush took office.

    And in 2000, Cheney said a Bush administration might “have to take military action to forcibly remove Saddam from power.” And see this.

    The administration’s false claims about Saddam and 9/11 helped convince a large portion of the American public to support the invasion of Iraq. While the focus now may be on false WMD claims, it is important to remember that, at the time, the alleged link between Iraq and 9/11 was at least as important in many people’s mind as a reason to invade Iraq.

    So the torture program was really all about “justifying” the ultimate war crime:  launching an unnecessary war of aggression based upon false pretenses.

    Postscript:   It is beyond any real dispute that torture does not work to produce any useful, truthfulintelligence.  Today, the following question made it to the front page of Reddit:

    Why would the CIA torture if torture “doesn’t work”? Wouldn’t they want the most effective tool to gather intelligence?

    The Senate Armed Services Committee report gave the answer.

    via WashgintonsBlog.

    CIA Torture Pseudonyms

    CIA Torture Pseudonyms

    cia-rendition-black-site-torture

    via Cryptome.org 11 December 2014

    CIA Torture Pseudonyms


    Paulmd199 sends:

    CIA Torture Pseudonyms Update: The “Associates” of “Company Y” are now known, as is “CIA officer 2.” Additional people and details have become known.

    The press has been hard at work uncovering the pseudonyms used and nailing down the true identities of the site. I compile them here.

    The most important outstanding questions: who are Detainees “R” & “S,” and where is detention site “red?” While I feel pretty strongly about redacting the names of low-level personnel from the NSA slides, which are technical in nature, I have zero interest in protecting torturers. The public has a right to know where these black sites were, and the detainees deserve a name and a fair trial.

    Detention sites:

    BLACK – RomaniaBLUE – “Quartz” – Stare Kiejkuty, Poland

    BROWN – Afghanistan

    COBALT – “Salt Pit” – Afghanistan

    GRAY – Afghanistan

    GREEN – Thailand

    INDIGO – Guantanamo

    MAROON – Guantanamo

    ORANGE – Afghanistan

    VIOLET – Lithuania

    RED – This could be an additional site in one of the above countries, or someplace entirely different. It is mentioned only once in the report, on page 140 of 499, and the entry is almost entirely redacted.

    Companies:

    Company Y – Mitchell, Jessen & Associates, based in Spokane, Washington.The “Associates” are David Ayers, Randall Spivey, James Sporleder, Joseph Matarazzo, and Roger Aldrich.

    It should be noted that there is no “Company X” in this report, I found this peculiar. It seems that there should be one, and as it happens there are several shady “Companies’ known: “Premier Executive Transport Services” Incorporated in Dedham Massachusetts, is known to have been part of the CIA rendition program. The names of its officers include “Coleen Bornt,” “Brian Dice” and “Tyler Edward Tate.” These are fictitious people.

    Other companies suspected of involvement in rendition include: “Stevens Express Leasing” “Richmor Aviation” “Rapid AirTrans” “Path Corporation”

    Businesses:

    Business Q – Associated with Zubair, associated with Hambali

    Torture Doctors:

    “Grayson Swigert” – James Mitchell”Hammond Dunbar” – Bruce Jessen

    CIA Officers:

    CIA Officer 1 – COBALT Site manager – Matthew Zirbel. Zirbel’s corrupt CIA boss (Convicted) Kyle “Dusty” Dustin Foggo overruled the 10 day suspension Zirbel received in the murder of Gul Rahman (innocent).CIA Officer 2 – Torturer at COBALT and BLUE – Albert El Gamil – retired from CIA in 2004.

    [Redacted] – Ron Czarnetsky, CIA Chief of Station on Warsaw, Poland from 2002 to 2005. This would make him responsible for site BLUE.

    [no mention] Alfreda Frances Bikowsky – Made herself involved in Waterboarding in Poland (BLUE) in March of 2003. Took trip unassigned and on own dime. Was “scolded” and told it “wasn’t supposed to be entertainment.” Would have been there at the same time as Mitchell and Jessen.

    Assets:

    Asset X – Directly involved in the capture of KSM.Asset Y – Reports on Janat Gul

    Persons:

    Person 1 – al-Ghuraba group member, with an interest in airplanes and aviation. “intelligence indicates the interest was unrelated to terrorist activity.”

    Detainees:

    Detainee R – Held by foreign government, rendered to CIA custodyDetainee S – Held by foreign government

    Sources:

    http://www.businessinsider.com/the-company-behind-cia-torture-2014-12http://www.washingtonpost.com/blogs/worldviews/wp/2014/12/09/decoding-the-secret-black-sites-on-the-senates-report-on-the-cia-interrogation-program/

    http://www.reuters.com/article/2014/12/10/us-usa-cia-torture-lithuania-idUSKBN0JO18M20141210

    http://www.nytimes.com/2014/12/11/world/cia-torture-report-draws-world-reaction.html?smid=tw-share&_r=0

    http://www.historycommons.org/entity.jsp?entity=zirbel_1

    https://news.vice.com/video/the-architect?utm_source=vicenewsfb

    http://www.wbrz.com/news/psychologist-defends-harsh-cia-interrogations/

    http://www.nbcnews.com/storyline/cia-torture-report/cia-paid-torture-teachers-more-80-million-n264756

    https://www.youtube.com/watch?v=SDxue3jGAug#t=541

    https://firstlook.org/theintercept/2014/12/15/charmed-life-cia-torturer/

    http://www.propublica.org/article/disgraced-senior-cia-official-heads-to-prison-still-claiming-hes-a-patriot

    http://cryptocomb.org/?p=421

    https://www.youtube.com/watch?v=ih1GgxOoSZ8

    Ray McGovern – Intelligence, Activist

    Ray McGovern – Intelligence, Activist

    Ray-McGovern

    Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.National Intelligence Estimates and prepared the President’s Daily Brief.National Intelligence Estimates and prepared the President’s Daily Brief.National Intelligence Estimates and prepared the President’s Daily Brief. We need more people who work for the government to follow in the foot steps of these brave leaders. The truth movement would not be the same without the efforts of these great men and wonen.We need more people who work for the government to follow in the foot steps of these brave leaders. The truth movement would not be the same without the efforts of these great men and wonen.We need more people who work for the government to follow in the foot steps of these brave leaders. The truth movement would not be the same without the efforts of these great men and wonen.

    Jake Davis – Hacker

    Jake Davis – Hacker

    Jake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. Jake Davis He has worked with AnonyJake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake Davis

    John Kiriakou – Intelligence, Leaker

    John Kiriakou – Intelligence, Leaker

    John Kiriakou is a former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.

    John Kiriakou is a former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.John Kiriakou is a former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.former CIA analyst and case officer, former senior investigator for the Senate Foreign Relations Committee, and former counterterrorism consultant for ABC News, blogger for Huffington Post, and author.

    Robert David Steele – Intelligence, Activst

    Robert David Steele – Intelligence, Activst

    Robert-David-Steele

    Robert David Steele Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Robert David Steele Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.

    Robert-David-Steele

    Robert David Steele Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Robert David Steele Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.

    Robert-David-Steele

    Robert David Steele Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Robert David Steele Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.Vivas is an American activist and a former Central Intelligence Agency clandestine services case officer known for his promotion of open source intelligence.

    COINTELPRO

    COINTELPRO

    cointelproThe FBI began COINTELPRO—short for Counterintelligence Program—in 1956 to disrupt the activities of the Communist Party of the United States. In the 1960s, it was expanded to include a number of other domestic groups, such as the Ku Klux Klan, the Socialist Workers Party, and the Black Panther Party. All COINTELPRO operations were ended in 1971. Although limited in scope (about two-tenths of one percent of the FBI’s workload over a 15-year period), COINTELPRO was later rightfully criticized by Congress and the American people for abridging first amendment rights and for other reasons.

    The Secret Project to Create Weaponized Ebola in the 1980’s

    The Secret Project to Create Weaponized Ebola in the 1980’s

    Confronting Doctor Death from Bob Coen on Vimeo.

    Following leads on the anthrax trail took us across four continents – filming outside the high security perimeter fences of some of the world’s most secret germ war labs (and inside a couple), tracking down and talking to experts and scientists some of whom were members of the so called “International Bio-Weapons Mafia”. None was more chilling than the face to face we got with the man they call Doctor Death – Wouter Basson, the army scientist who headed apartheid South Africa’s secret germ war program – Project Coast.

    Shrouded in mystery and hidden behind front companies that used worldwide intelligence connections, the shocking activities of the program only emerged after the fall of apartheid – revealing a shockingly sophisticated operation that had 200 scientists developing germ war agents to be used against the country’s black population.

    This was one of the very few interviews Doctor Death has given and for the first time he talks candidly about the help the received from the West, his relationship with David Kelly and the creation of “the Black Bomb” an agent that could sterilize blacks without their knowledge.

    And then there’s his strange relationship with Larry Ford, the Mormon gynecologist to Hollywood stars who was also moonlighting for the South Africans and had CIA connections.

    Some experts are wondering whether Doctor Deaths’s program provided a convenient off-shore operation for Western germ war experimentation?

    wouter-basson-doctor-deathOperating out of South Africa during the Apartheid era in the early 1980’s, Dr. Wouter Basson launched a secret bioweapons project called Project Coast. The goal of the project was to develop biological and chemical agents that would either kill or sterilize the black population and assassinate political enemies. Among the agents developed were Marburg and Ebola viruses.

    Basson is surrounded by cloak and dagger intrigue, as he told Pretoria High court in South Africa that “The local CIA agent in Pretoria threatened me with death on the sidewalk of the American Embassy in Schoeman Street.” According to a 2001 article in The New Yorker magazine, the American Embassy in Pretoria was “terribly concerned” that Basson would reveal deep connections between Project Coast and the United States.

    In 2013, Basson was found guilty of “unprofessional conduct” by the South African health council.

    Bioweapons expert Jeanne Guillemin writes in her book Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism, “The project‘s growth years were from 1982 to 1987, when it developed a range of biological agents (such as those for anthrax, cholera, and the Marburg and Ebola viruses and for botulinum toxin)…

    Basson’s bioweapons program officially ended in 1994, but there has been no independent verification that the pathogens created were ever destroyed. The order to destroy them went directly to Dr. Basson. According to the Wall Street Journal, “The integrity of the process rested solely on Dr. Basson’s honesty.”

    Basson claims to have had contact with western agencies that provided “ideological assistance” to Project Coast. Basson stated in an interview shot for the documentary Anthrax War that he met several times with Dr. David Kelly, the infamous UN weapons inspector in Iraq. Kelly was a top bioweapons expert in the United Kingdom. He was found dead near his home in Oxfordshire in 2003. While the official story claims he committed suicide, medical experts highly doubt this story.

    In a 2007 article from the Mail Online, it was reported that a week prior to his death, Dr. Kelly was to be interviewed by MI5 about his ties to Dr. Basson.

    Dr. Timothy Stamps, Minister of Health of Zimbabwe, suspected that his country was under biological attack during the time that Basson was operating. Stamps told PBS Frontline in 1998 that “The evidence is very clear that these were not natural events. Whether they were caused by some direct or deliberate inoculation or not, is the question we have to answer.”

    Stamps specifically named the Ebola and Marburg viruses as suspect. Stamps thinks that his country was being used as a testing ground for weaponized Ebola.

    “I’m talking about anthrax and cholera in particular, but also a couple of viruses that are not endemic to Zimbabwe [such as] the Ebola type virus and, we think also, the Marburg virus. We wonder whether in fact these are not associated with biological warfare against this country during the hostilities…Ebola was along the line of the Zambezi [River], and I suspect that this may have been an experiment to see if a new virus could be used to directly infect people.”

    The Ghanaian Times reported in early September on the recent Ebola outbreak, noting connections between Basson and bioweapons research. The article points out that, “…there are two types of scientists in the world: those who are so concerned about the pain and death caused to humans by illness that they will even sacrifice their own lives to try and cure deadly diseases, and those who will use their scientific skill to kill humans on the orders of… government…”

    Indeed, these ideas are not new. Plato wrote over 2,000 years ago in his work The Republic that a ruling elite should guide society, “…whose aim will be to preserve the average of population.” He further stated, “There are many other things which they will have to consider, such as the effects of wars and diseases and any similar agencies, in order as far as this is possible to prevent the State from becoming either too large or too small.”

    As revealed by The Age, Nobel prize winning Australian microbiologist Sir Macfarlane Burnet secretly urged the Australian government in 1947 to develop bio weapons for use against the “overpopulated countries of South-East Asia.” In a 1947 meeting with the New Weapons and Equipment Development Committee, the group recommended that “the possibilities of an attack on the food supplies of S-E Asia and Indonesia using B.W. agents should be considered by a small study group.”

    This information gives us an interesting perspective on the recent unprecedented Ebola outbreak. Is it an organic natural phenomenon? Did this strain of Ebola accidentally escape from a bioweapons lab? Or, was it deliberately released?

     

    Matt DeHart: Former Soldier Wanted by the US for Working with Anonymous

    Matt DeHart: Former Soldier Wanted by the US for Working with Anonymous

    matt-dehart-anonymous

    Life is not easy for 30-year-old .

    Just a few years ago he was doing well; as a trained Intelligence Analyst in the US Air National Guard he looked forward to a stable and glamorous career at the center of action, living inside a virtual videogame and fighting America’s enemies via drones. It was a heady combination of gamer geek dreams and the aspirations of a good boy who’d grown up in a military family, following his parents’ path to public service.

    Now he sits in a cell in a foreign country, far from his Indiana roots, suffering from PTSD and recovering from two apparent suicide attempts. The last one by diving headfirst onto a concrete floor from a top bunk bed. He’s struggling hard to stay in that cell, too; or at least, never to return to the land of his birth, the land he once served so proudly.

    In a series of clipped, yet eloquent, emails Major Paul DeHart, Matt’s father, talked to us about the struggles his family have been through in the days since. “No prison is a good prison. Depriving any human being much less one who has grown up under western law which in theory at least values human dignity and freedom above most things is punishment enough. I will say compared to the way human beings in general and prisoners specifically are treated in any US prison system, state or federal, Canadian prisoners seem to be treated as human beings with at least the potential for rehabilitation.”

    “But, the US approach to warehousing prisoners and exploiting them as resources for labour and prison-industrial-complex businesses is no different than the way the US approaches old people in nursing homes or labour in general. From a corporatist standpoint, a human resource which is no longer productive is no longer of any value. The concept of intrinsic human value seems to have been forgotten.”

    On his son’s complex situation and appeal for sanctuary: “It’s simple in our book. He was tortured by the US. That is a violation of international law. Does anyone doubt any more that the US tortures people? If they have done it overseas to supposed enemies – why not to their own citizens? Why is the US Senate report in CIA torture still not released. You figure it out. Along those lines – I reference what happened to Canadian citizen [Maher] Arar.”

    As Matt himself explained to the National Post, “It’s not that I’m not patriotic — I am. I voted for Bush. My family is military, pretty gung ho. But everything has changed.”

    The DeHart case (as explained in the masterful five-part National Post chronicle) is neither straightforward nor at first glance tremendously sympathetic. Of his own volition he walked into the Russian Embassy in Washington, DC. What happened there depends on which version of the stories he’s told you believe. Either he was there to look for work and a new start, having lost faith in the US, or he was there to mislead them about drone technology, deliberately handing them misinformation to protect the country he loved. But what does this have to do with the child pornography charges against him, the only charges which have been filed? And if he’s wanted on child pornography charges, why did the FBI interrogate him as part of an espionage investigation, as the documentation shows?

    And what does this have to do with Anonymous?

    It all started with Chanology. According to statements DeHart gave Adrian Humphreys of the National Post, he participated in Project Chanology, the original “moralfag” action which pitted Anonymous against the Church of Scientology. There were many aspects to the operation, but the most famous was the adoption of the Guy Fawkes mask, since become inextricably associated with the hacktivist collective. The statements DeHart gave were corroborated by operation founder Gregg Housh, although he could not specifically identify participants, having known them only via pseudonyms.

    Chanology was DeHart’s first taste of activism, and he liked it. Getting deeper into the hacktivist scene, he eventually ran a server on which some files which may or may not have been destined for WikiLeaks resided.

    His American lawer Tor Ekeland told us via email, “This whole matter revolves around a file that appeared in the fall of 2009 on a TOR server Matt was a co-sys admin. People speculate that it was enroute to Wikileaks, although I have not seen any confirmation of this fact. The file was unencrypted for the first two days on the server. According to published reports, it’s an FBI investigative file of domestic criminal activity by the CIA.”

    Then came the raid.

    That was 2010. No malware and no such mystery file was found on DeHart’s computer equipment; he’d long since deleted the file, which had been uploaded to the server by someone else.

    I opened the door and it was the police task force. Your stomach drops and your heart beats like crazy. It takes you by surprise, even though I had nothing to hide once the server was destroyed…

    I was shook up,” Matt said. “I don’t know everything they took, but I know they took everything. After they had left I looked at the search warrant which was left on the couch. It was a generic warrant from the Memphis FBI field office and it said they were searching for child pornography.”

    That was when he started to lose faith. Not too long after that he visited the Russian and Venezuelan embassies, looking for the future he could no longer see himself having in the USA. He didn’t find it there and decided to take the same route once taken by escaped slaves, the Underground Railway to the free environs of Canada.

    Part of the reasoning, as his father told Humphreys, was that if there was any hold-up with the passport, they’d know the child porn incident wasn’t over. There was no problem with the passport. He left, signed up for a French Immersion course which to his chagrin didn’t take, then enrolled in technical college in scenic Prince Edward Island, intending to study welding. “I figured I’d try something that had nothing to do with computers. I felt good going to Canada,” he explained to the National Post.

    All was going well, but in order to start school he needed a student visa, which he had to obtain from his home country.

    You see this coming, don’t you?

    He bussed across the St Croix river to the American side, where he spent the night at a hotel and took care of the paperwork. Then he headed back to Canada. Presenting his passport at the border, he anticipated no issues. The guard scanned it, checked the computer, scanned it again, went into an office to check something, and suddenly all hell broke loose.

    While two guards threw themselves in front of the exit, blocking it, DeHart was cuffed and plopped in a chair. Soon he was tumbled into the back of a Border Patrol vehicle which was driven by an FBI agent and taken to an ICE detention center, where he was refused a lawyer and detained.

    DeHart says he was strapped into a lab chair and drugged with an IV drip, before being aggressively questioned for hours. He was shown a new criminal complaint, charging him with soliciting child pornography; it was written that very day.

    His father explained some anomalies. “We have repeatedly asked in court in the US for actual transcripts of his interrogations and have been told there are no audio or video records. Yeah right. Two agents are flown out from the national security section in DC to interrogate Matt and there are no records. Hmmm.”

    He was transferred from the ICE detention center to another holding facility, where he collapsed and was taken to hospital, where the doctors determined him to be in a paranoid state, claiming persecution by the FBI. His symptoms were consistent with “drug induced psychosis” according to medical personnel.

    Department of Justice documents show that DeHart was not actually detained on child porn charges; he was detained relating to an issue of national security/espionage. And he remained detained for months, until a judge added up the inconsistencies in the case, found DeHart a credible witness and not a flight risk, and ordered that he be released with a monitoring bracelet and curfew.

    On November 5, Guy Fawkes Day, Million Mask March day, Matt DeHart filed a motion to dismiss the charges against him.

    On April 2 of the next year, he and his family fled, driving north almost a full day and night to a border station in Fort Francis, Ontario, where they claimed refugee status and requested asylum from the Canadian government. Ekeland explained, “He and his family are seeking refugee status in Canada based on the fact that Matt was tortured by the FBI and that he cannot get a fair trial in the U.S.”

    Paul DeHart said, “We came to Canada to seek protection from the US under international law. We know the tremendous courage it would take any Canadian official to stand up to Canada’s closest ally and biggest trading partner. However, it has been done before. In my generation Canada welcomed war protesters who disobeyed draft laws in the US and came to Canada where tens of thousands of them were granted immigrant status and protected.” In more recent, more Conservative times, however, the Canadian government has been rounding up and repatriating (ie returning to the US) AWOL American soldiers.

    The next day the Canadian government from whom they were seeking aid charged Matt with espionage against Canada.

    “There are Americans who try to sneak across the Canadian border to flee US law enforcement all the time,’” said Paul DeHart. CBSA [Canada Border Services Agency] I’m sure keeps stats. We did not sneak anywhere. We reported to a CBSA office and declared ourselves as asylum seekers under the UN Convention Against Torture (CAT). Matt was not detained by Canadian officials until the following day when a US Judge issued an arrest warrant for failing to appear at a schedule court hearing.”

    And this, along with the still-unresolved child pornography charges, is why Matt DeHart has spent the last year in Canadian jail cells. At one point he won limited release, and was reunited with his family, but when the family moved to a different apartment Matt notified his corrections officer of the move in an incorrect manner: by notifying the company in charge of his electronic monitor, who then notified the officer. His father explained, “Someone in the CBSA made a decision to have him rearrested on a
    reporting technicality which had nothing to do with flight risk or danger to the community and forfeit the $10,000 bond we put up. Money by the way we could not afford to lose.” He remains in custody. Rallies for his release have been unsuccessful, if high-profile.

    Paul DeHart told us, “You should thank God as Canadians you seem to still have a mature and unbiased judiciary. The judge who reviewed Matt’s bond release in Sept 2013, after CBSA challenged it in court, wrote a very well-supported opinion which basically said in paraphrase – in Canada someone is innocent until proven guilty. If her 13-page opinion is indicative of the quality of
    Canadian judges, then I’d say at least judicially, Canadians are in good hands.”

    “We are awaiting two decisions by the Immigration and Refugee Board. First, we await the admissibility decision for Matt. He is opposed by the govt for the charges in TN. The final submissions were sent in middle of August. A negative decision will start a time clock on a shortened process to have Matt sent back to the US. Actually, it’s my understanding that he would just have to be deported from Canada. Theoretically it doesn’t have to be back to the US, but where else would he be sent?”

    “The other decision is whether as a family we qualify under for protection from the Canadian government. Final submission for that hearing are due this month. No telling how long either decision will take. Considering the unusual nature of our claim, we suspect the Canadian government will be sure to make a very thorough examination of each and have detailed rationale for the decisions.” This is going to involve a lot of lawyers, though, and they are not inexpensive, particularly for a couple of new immigrants who left behind established careers. “The [child porn] case in Tennessee is suspended until/unless Matt returns to the US as we understand it.”

    The governments in question don’t appear to be in any rush. Major DeHart raises an interesting question: extradition. “After being in Canada since April 2013, a year and a half, there has been no extradition request from the US. Since these are relatively routine it raises the question – why not?”

    We asked DeHart about the extent to which the Canadian and US governments were cooperating on the case. “Who knows?” he replied. “Clearly the questions Matt was asked by both CSIS [Canadian Security Intelligence Service, the “Canadian FBI”] and the War Crimes unit of CBSA were focused on events in the US which had nothing to do with child pornography. Questions Leann and I were asked at the admissibility hearing by CBSA hearings officers seemed to have come directly from the US. And, that makes sense since US border personnel are on Canadian soil and work closely with CBSA.”

    Their old government seems content to leave the entire family in the hands of the Canadians, despite maintaining an apparent interest in watching events unfold. “We have not been contacted by anyone from the US government since we came to Canada,” Paul DeHart told us. “I will say that the day after we crossed the border in Ft. Frances we noticed at least a dozen US Homeland Security vehicles parked in that relatively small town. I do know we did not feel safe from the US there.” As a former NSA employee, DeHart is well-equipped to identify HS vehicles.

    On September 12 DeHart’s US attorney Tor Ekeland created an online fundraiser to cover his legal expenses. He chose the site GoFundMe, which often works with Anonymous fundraisers.

    That same day, the fundraiser was shut down.

    “We got an email from GoFundMe saying we’d violated their Terms of Service, and that our account was being terminated,” Ekelund told me via email. “When we asked for explanation we got none. By the time we’d received the email the account had already been deleted.”

    Paul DeHart said, “Well, you can draw your own conclusions. Supposedly the site was taken down for a violation of terms of service. But, since it was started and run by a law firm, that makes little sense.”

    Not wasting any time, Ekeland immediately rebuilt the fundraiser on Canadian site Fundrazr, which also hosts Julian Assange’s personal fundraiser. “We had the Fundrazr up in an hour or two, most of the time which was spent on looking at alternatives sites. It took about 15 minutes to actually get it up and running again. It stands at $550 of a $10,000 goal.

    “No money was lost. Gofundme sent us everything. I really don’t focus on fundraising, and I usually go thousands of dollars out of pocket on the cases I have that are like this. I never make money of these types of cases, and I’m certainly not doing it for the money.”

    The future is uncertain, obscured in a blizzard of paperwork, allegations, missing files, and, most recently, very specific publication bans (which we are probably breaking by reporting this). There are two powerful, often collusive, governments

    Ekeland explained, “As of this writing, the U.S. government has not taken any action to extradite Matt. They will not try him in absentia.”

    Paul DeHart sums it up. “Unless you have spent a large part of your adult life serving in the S military you would have a hard time understanding what an absolutely gut-wrenching, traumatic experience it is to have to fill out a basis of claim form for asylum against the country you love and served. But there is no excuse for what was done to our son, and no one in the US seemed to care about that.”

    “It is our intention to remain in Canada and live out the rest of our lives in peace. If we are granted status we would never be allowed to return to the country of our birth. My own mother passed away in May 2013 after we came here. I was unable to attend her funeral.”

    “If we are permitted to remain in Canada and Matt is allowed free to pursue life again, then our lives will resume. We will work, live, and make a new life in Canada. We have no ambitions beyond this: to live free from the fear of the US government. Imagine knowing that your head is in the sights of a sniper some 2 miles away. You know that at any moment a trigger can be pulled sending a 50 calibre bullet into your skull and exploding it. I know that’s graphic and perhaps hyperbole, but that is what it
    feels like to know that our lives are in the sights of the most powerful government on earth.”

    “You wonder if this is the day someone pulls the trigger.”

    Featured Image via Free Matt DeHart

    NOTE: Matt’s job description has been corrected. He was originally reported to be a drone pilot, but was actually an Intelligence Analyst. His father writes, “His job in the Air National Guard was equivalent to PFC Manning’s in the Army.”

    via: TheCryptoSphere.com

    ISIS aka CIA Proxy Freedom Fighters: The Beheading Psy-Ops

    ISIS aka CIA Proxy Freedom Fighters: The Beheading Psy-Ops

    Western Foreign Policy Based on Sheer Propaganda

    By Vivian Lee

    With a rash of “beheadings” sweeping the world, a horrified public is asked to see this depraved barbarity as The New Normal.

    First we had the August “murder” on video of U.S. journalist James Foley, shown kneeling before a black-robed, masked figure brandishing a knife. Yes, even a rather small knife can do it (just as box-cutters can enable the hijacking of commercial airplanes). The perpetrator is identified as a member of the terrorist group ISIS (or IS or ISIL), which supposedly wants to install a new Islamic caliphate based in the region.

    However, the video did not actually show the beheading, but faded to black at the appropriate moment. A subsequent frame purports to show Foley’s head propped up on his headless body. This video was staged, however, as proved by numerous researchers, and even admitted in the British press.[1] According to a report in The Telegraph:

    …a study of the four-minute 40-second clip, carried out by an international forensic science company which has worked for police forces across Britain, suggested camera trickery and slick post-production techniques appear to have been used…no blood can be seen, even though the knife is drawn across the neck area at least six times.[2]

    Nonetheless, the U.S. media continue to report this “beheading” as a real occurrence, over and over again, followed by another “beheading” of an American journalist, Steven J. Sotloff, in a video released in early September. This was supposedly a “second message to America” from ISIS: “Just as your missiles continue to strike our people, our knife will continue to strike the necks of your people.”[3] This video too is problematic, with no blood in evidence before the scene fades to black.[4]

    nyp_savagesBoth Foley and Sotloff have intelligence connections, as does SITE, the media dissemination service behind the release of the videos. SITE [Search for International Terrorist Entities] is an offshoot of Intel Center, both of which have an uncanny ability to produce such material at the most opportune times in support of U.S. foreign policy.[5] A visit to the SITE website is instructive.[6]

    The SITE Intelligence Group, founded in 2001 by Rita Katz, is an intelligence gathering operation that monitors jihadists online, often finding terrorist statements and videos as uploads “before they are published,” according to Katz. These are transmitted to U.S. intelligence services, which are curiously beholden to SITE for these sensitive materials, and they are then released to the U.S. media.[7]

    All such information obtained by SITE and then broadcast is therefore suspect. Nonetheless, the Foley and Sotloff videos have reportedly gotten the U.S. public on board with the bombing of northern Iraq and Syria in an R-2-P operation (Responsibility To Protect), the real goal being to take out Bashar al-Assad in Syria.

    As for the U.K., David Haines was shown in a third “beheading” video released by SITE in mid-September.[8] And the black-robed “killer” has a British accent, which surely indicates that British citizens have gone to Iraq-Syria to join ISIS – and that they could return to wreak havoc in the homeland.

    Not to neglect France, which now has its own beheading – of Hervé Gourdel, a mountaineering guide from Nice who was kidnapped in Algeria, shown in a video released by SITE in late September.[9] And certainly Australia should have one as well, but a dastardly ISIS plot in Sydney was reportedly thwarted by the government.[10]

    These western countries are instrumental to the U.S.-led coalition to protect the world against ISIS, since the coalition initially included only Middle Eastern client states such as Saudi Arabia, Qatar, Bahrain, United Arab Emirates, and Jordan. As of this writing, France, Australia, Belgium, Denmark, and England have now signed on, with Turkey lining up as well.[11]

    Just to drive the point home (as it were) for any “war weary” Americans out there, we now have a home-grown beheading of an employee at isis-cia-proxy-freedom-fightersa food processing plant in Moore, Oklahoma. The perpetrator, a black man named Alton Nolen, is said to have been fired from his job at Vaughan Foods. Nolen “recently started trying to convert some of his co-workers to the Muslim religion,” according to a police spokesperson.[12]

    On “a Facebook page that appears to be his,” Nolen posted the following: “This is the last days… AMERICA AND ISRAEL ARE WICKED. WAKE UP MUSLIMS!!!” The FBI is assisting with the investigation after putting out “an alert to local law enforcement officials across the country to be on the watch for so-called lone wolves who might respond violently” in the wake of U.S. bombing in Syria. Now ask yourself: is this scenario credible?[13]

    Nonetheless, the “beheadings”are getting major traction in the U.S. press. Magazines feature articles and editorials, television anchors report with great gravity, and radio hosts banter with listeners about these fake events. WAKE UP AMERICANS!!! As this war propaganda multiplies, with gullible members of the public accepting these psy-ops as fact, at stake are the destruction of the Middle East, continued massive “collateral damage” in Iraq and Syria – and the degrading of our own collective mentality.[14]

    Notes

    [1] “Media Damage Control on James Foley Video: Experts Now Conclude Video Is Fake” (Red Pill Revolution).

    [2] “Foley Murder Video ‘May Have Been Staged’.” The Telegraph, August 25, 2014.

    [3] “ISIS Video Shows Beheading of American Journalist Steven Sotloff.” CNN World, September 9, 2014.

    [4] “James Foley Steven Sotloff ISIS Beheading Absolutely Fake Hoax” (TeamWakeEmUP).

    [5] “Staged Foley, Sotloff Beheading Videos ‘Not Evidence,’ U.S. Determined to Wage War of Fear on Its Own People.” 21st Century Wire, September 9, 2014.

    [6] http://ent.siteintelgroup.com/

    [7] James Tracy, “Who Is Behind the Islamic State (ISIL) Beheadings? Probing the SITE Intelligence Group.” Global Research, September 15, 2014.

    [8] “ISIS Video Shows British Hostage Being Beheaded.” New York Times, September 14, 2014.

    [9] “French Hostage in Algeria Is Beheaded in Video Released by Militants.” New York Times, September 25, 2014.

    [10] http://abcnews.go.com/International/wireStory/australian-leader-warns-planned-random-attack-25585654

    [11] “Three More Countries Join the Coalition against ISIS.” Time.com, September 26, 2014.

    [12] “Woman Is Beheaded in Attack at Oklahoma Food Plant.” New York Times, September 27, 2014.

    [13] “Oklahoma Beheading Hoax Alton Nolen ISIS Lone Wolf” (TeamWakeEmUP).

    [14] Michel Chossudovsky, “The Terrorists R Us: The Islamic State Big Lie.” Global Research, September 25, 2014.


     Vivian Lee PhD, is a professor at an East Coast university.

    The Covert Origins of ISIS

    The Covert Origins of ISIS

    Evidence exposing who put ISIS in power, and how it was done.

    The Islamic militant group ISIS, formerly known as Al-Qaeda in Iraq, and recently rebranded as the so called Islamic State, is the stuff of nightmares. They are ruthless, fanatical, killers, on a mission, and that mission is to wipe out anyone and everyone, from any religion or belief system and to impose Shari’ah law. The mass executions, beheadings and even crucifixions that they are committing as they work towards this goal are flaunted like badges of pride, video taped and uploaded for the whole world to see. This is the new face of evil.

    iss-money-dollar-symbolism-conspiracyWould it interest you to know who helped these psychopaths rise to power? Would it interest you to know who armed them, funded them and trained them? Would it interest you to know why?

    This story makes more sense if we start in the middle, so we’ll begin with the overthrow of Muammar Gaddafi in 2011.

    The Libyan revolution was Obama’s first major foreign intervention. It was portrayed as an extension of the Arab Spring, and NATO involvement was framed in humanitarian terms.

    The fact that the CIA was actively working to help the Libyan rebels topple Gaddafi was no secret, nor were the airstrikes that Obama ordered against the Libyan government.However, little was said about the identity or the ideological leanings of these Libyan rebels. Not surprising, considering the fact that the leader of the Libyan rebels later admitted that his fighters included Al-Qaeda linked jihadists who fought against allied troops in Iraq.

    These jihadist militants from Iraq were part of what national security analysts commonly referred to as Al-Qaeda in Iraq. Remember Al-Qaeda in Iraq was ISIS before it was rebranded.

    With the assistance of U.S. and NATO intelligence and air support, the Libyan rebels captured Gaddafi and summarily executed him in the street, all the while enthusiastically chanting “Allah Akbar”. For many of those who had bought the official line about how these rebels were freedom fighters aiming to establish a liberal democracy in Libya, this was the beginning of the end of their illusions.

    Prior to the U.S. and NATO backed intervention, Libya had the highest standard of living of any country in Africa. This according to the U.N.’s Human Development Index rankings for 2010.However in the years following the coup, the country descended into chaos, with extremism and violence running rampant. Libya is now widely regarded as failed state (of course those who were naive enough to buy into the propaganda leading up to the war get defensive when this is said).

    Now after Gaddafi was overthrown, the Libyan armories were looted, and massive quantities of weapons were sent by the Libyan rebels to Syria. The weapons, which included anti-tank and anti-aircraft missiles were smuggled into Syria through Turkey, a NATO ally. The times of Londonreported on the arrival of the shipment on September 14th, 2012. (Secondary confirmation in this NYT article) This was just three days after Ambassador Chris Stevens was killed by the attack on the U.S. embassy in Benghazi. Chris Stevens had served as the U.S. government’s liaison to the Libyan rebels since April of 2011.

    While a great deal media attention has focused on the fact that the State Department did not provide adequate security at the consulate, and was slow to send assistance when the attack started, Pulitzer Prize winning journalist Seymour Hersh released an article in April of 2014 which exposed a classified agreement between the CIA, Turkey and the Syrian rebels to create what was referred to as a “rat line”. The “rat line” was covert network used to channel weapons and ammunition from Libya, through southern turkey and across the Syrian border. Funding was provided by Turkey, Saudi Arabia and Qatar.

    With Stevens dead any direct U.S. involvement in that arms shipment was buried, and Washington would continue to claim that they had not sent heavy weaponry into Syria.

    It was at this time that jihadist fighters from Libya began flooding into Syria as well. And not just low level militants. Many were experienced commanders who had fought in multiple theaters.

    The U.S. and its allies were now fully focused on taking down Assad’s government in Syria. As in Libya this regime change was to be framed in terms of human rights, and now overt support began to supplement the backdoor channels. The growing jihadist presence was swept under the rug and covered up.

    However as the rebels gained strength, the reports of war crimes and atrocities that they were committing began to create a bit of a public relations problem for Washington. It then became standard policy to insist that U.S. support was only being given to what they referred to as“moderate” rebel forces.

    This distinction, however, had no basis in reality.

    In an interview given in April of 2014, FSA commander Jamal Maarouf admitted that his fighters regularly conduct joint operations with Al-Nusra. Al-Nusra is the official Al-Qa’ida branch in Syria. This statement is further validated by an interview given in June of 2013 by Colonel Abdel Basset Al-Tawil, commander of the FSA’s Northern Front. In this interview he openly discusses his ties with Al-Nusra, and expresses his desire to see Syria ruled by sharia law. (You can verify the identities of these two commanders here in this document from The Institute for the Study of War)

    Moderate rebels? Well it’s complicated. Not that this should really come as any surprise. Reuters had reported in 2012 that the FSA’s command was dominated by Islamic extremists, and the New York Times had reported that same year that the majority of the weapons that Washington were sending into Syria was ending up in the hands Jihadists. For two years the U.S. government knew that this was happening, but they kept doing it.

    And the FSA’s ties to Al-Nusra are just the beginning. In June of 2014 Al-Nusra merged with ISIS at the border between Iraq and Syria.

    So to review, the FSA is working with Al-Nusra, Al-Nusra is working with ISIS, and the U.S. has been sending money and weapons to the FSA even though they’ve known since 2012 that most of these weapons were ending up in the hands of extremists. You do the math.

    [UPDATE 9.03.14]: Retired Lt. Gen. Tom McInerney admits: “We Helped Build ISIS”:
    Note that the first version of this video I uploaded (here) was quickly taken down. To insure that this clip does not disappear we have provided a secondary download link here. So if the video below isn’t playing then use that link and upload it elsewhere.

    Syria, we backed I believe, in some cases some of the wrong people and not in the right part of the Free Syrian Army (FSA) that’s a little confusing to people. So I’ve always maintained, and go back quite some time that we were backing the wrong types. I think it’s going to turn out maybe this weekend in a new special that Brett Baer is going to have Friday that’s gonna show some of those weapons from Benghazi ended up in the hands of ISIS. So we helped build ISIS.

    In that context, the sarin gas attacks of 2013 which turned out to have been committed by the Syrian rebels, makes a lot more sense doesn’t it? If it wasn’t enough that U.N. investigators,Russian investigators, and Pulitzer prize winning journalist Seymour Hersh all pinned that crime on Washington’s proxies, the rebels themselves threatened the West that they would expose what really happened if they were not given more advanced weaponry within one month.

    By the way, this also explains why Washington then decided to target Russia next.

    This threat was made on June 10th, 2013. In what can only be described as an amazing coincidence, just nine days later, the rebels received their first official shipment of heavy weapons in Aleppo.

    After the second sarin gas fiasco, which was also exposed and therefore failed to garner public support for airstrikes, the U.S. continued to increase its the training and support for the rebels.

    In February of 2014, Haaretz reported that the U.S. and its allies in the region, Saudi Arabia, Jordan and Israel, were in the process of helping the Syrian rebels plan and prepare for a massive attack in the south. According to Haaretz Israel had also provided direct assistance in military operations against Assad four months prior (you can access a free cached version of the page here).

    Then in May of 2014 PBS ran a report in which they interviewed rebels who were trained by the U.S. in Qatar. According to those rebels they were being trained to finish off soldiers who survived attacks.

    “They trained us to ambush regime or enemy vehicles and cut off the road,” said the fighter, who is identified only as “Hussein.” “They also trained us on how to attack a vehicle, raid it, retrieve information or weapons and munitions, and how to finish off soldiers still alive after an ambush.”

    This is a blatant violation of the Geneva conventions. It also runs contrary to conventional military strategy. In conventional military strategy soldiers are better off left wounded, because this ends up costing the enemy more resources. Executing captured enemy soldiers is the kind of tactic used when you want to strike terror in the hearts of the enemy. It also just happens to be standard operating procedure for ISIS.

    One month after this report, in June of 2014, ISIS made its dramatic entry, crossing over the Syrian border into Iraq, capturing Mosul, Baiji and almost reaching Baghdad. The internet was suddenly flooded with footage of drive by shootings, large scale death marches, and mass graves. And of course any Iraqi soldier that was captured was executed.

    Massive quantities of American military equipment were seized during that operation. ISIS took entire truckloads of humvees, they took helicopters, tanks, and artillery. They photographed and video taped themselves and advertised what they were doing on social media, and yet for some reason Washington didn’t even TRY to stop them.

    U.S. military doctrine clearly calls for the destruction of military equipment and supplies when friendly forces cannot prevent them from falling into enemy hands, but that didn’t happen here. ISIS was allowed to carry this equipment out of Iraq and into Syria unimpeded. The U.S. military had the means to strike these convoys, but they didn’t lift a finger, even though they had been launching drone strikes in Pakistan that same week.

    Why would they do that?

    Though Obama plays the role of a weak, indecisive, liberal president, and while pundits from the right have had a lot of fun with that image, this is just a facade. Some presidents, like George W. Bush, rely primarily on overt military aggression. Obama gets the same job done, but he prefers covert means. Not really surprising considering the fact that Zbigniew Brzezinski was his mentor.

    Those who know their history will remember that Zbigniew Brzezinski was directly involved in the funding and arming the Islamic extremists in Pakistan and Afghanistan in order to weaken the Soviets.

    By the way Osama bin Laden was one of these anti-Soviet “freedom fighters” the U.S. was funding and arming.

    This operation is no secret at this point, nor are the unintended side effects.

    Officially the U.S. government’s arming and funding of the Mujahideen was a response to the Soviet invasion in December of 1979, however in his memoir entitled “From the Shadows” Robert Gates, director of the CIA under Ronald Reagan and George Bush Senior, and Secretary of Defense under both George W. Bush and Barack Obama, revealed that the U.S. actually began the covert operation 6 months prior, with the express intention of luring the Soviets into a quagmire. (You can preview the relevant text here on google books)

    The strategy worked. The Soviets invaded, and the ten years of war that followed are considered by many historians as being one of the primary causes of the fall of the USSR.

    This example doesn’t just establish precedent, what we’re seeing happen in Iraq, Afghanistan and Syria right now is actually a continuation of a old story. Al-Nusra and ISIS are ideological and organizational decedents of these extremist elements that the U.S. government made use of thirty years ago.

    The U.S. the went on to create a breeding ground for these extremists by invading Iraq in 2003. Had it not been for the vacuum of power left by the removal and execution of Saddam, Al-Qaeda in Iraq, aka ISIS, would not exist. And had it not been for Washington’s attempt at toppling Assad by arming, funding and training shadowy militant groups in Syria, there is no way that ISIS would have been capable of storming into Iraq in June of 2014.

    On every level, no matter how you cut it, ISIS is a product of U.S. government’s twisted and decrepit foreign policy.

    Now all of this may seem contradictory to you as you watch the drums of war against ISIS begin to beat louder and the air strikes against them are gradually widenedhttp://www.wjla.com/articles/2014/08/president-obama-considers-possible-…). Why would the U.S. help a terrorist organization get established, only to attack them later?

    Well why did the CIA put Saddam Hussein in power in 1963?, Why did the U.S. government back Saddam in 1980 when he launched a war of aggression against Iran, even though they knew that he was using chemical weapons? Why did the U.S. fund and arm Islamic extremists in Afghanistan against the Soviets?

    There’s a pattern here if you look closely. This is a tried and true geopolitical strategy.

    Step 1: Build up a dictator or extremist group which can then be used to wage proxy wars against opponents. During this stage any crimes committed by these proxies are swept under the rug. [Problem]

    Step 2: When these nasty characters have outlived their usefulness, that’s when it’s time to pull out all that dirt from under the rug and start publicizing it 24/7. This obviously works best when the public has no idea how these bad guys came to power.[Reaction]

    Step 3: Finally, when the public practically begging for the government to do something, a solution is proposed. Usually the solution involves military intervention, the loss of certain liberties, or both. [Solution]

    ISIS is extremely useful. They have essentially done Washington dirty work by weakening Assad. In 2014, while the news cycle has focused almost exclusively on Ukraine and Russia, ISIS made major headway in Syria, and as of August they already controlled 35% of the country.

    Since ISIS largely based in Syria, this gives the U.S. a pretext to move into Syria. Sooner or later the U.S. will extend the airstrikes into Assad’s backyard, and when they do U.S. officials are already making it clear that both ISIS and the Syrian government will be targeted. That, after all, is the whole point. Washington may allow ISIS to capture a bit more territory first, but the writing is on the wall, and has been for some time now.

    The Obama administration has repeatedly insisted that this will never lead to boots on the ground, however, the truth of the matter is that anyone who understands anything about military tactics knows full well that ISIS cannot be defeated by airstrikes alone. In response to airstrikes ISIS will merely disperse and conceal their forces. ISIS isn’t an established state power which can be destroyed by knocking out key government buildings and infrastructure. These are guerrilla fighters who cut their teeth in urban warfare.

    To significantly weaken them, the war will have to involve ground troops, but even this is a lost cause. U.S. troops could certainly route ISIS in street to street battles for some time, and they might even succeed in fully occupying Syria and Iraq for a number of years, but eventually they will have to leave, and when they do, it should be obvious what will come next.

    The puppets that the U.S. government has installed in the various countries that they have brought down in recent years have without exception proven to be utterly incompetent and corrupt. No one that Washington places in power will be capable of maintaining stability in Syria. Period.

    Right now, Assad is the last bastion of stability in the region. He is the last chance they have for a moderate non-sectarian government and he is the only hope of anything even remotely resembling democracy for the foreseeable future. If Assad falls, Islamic extremist will take the helm, they will impose shari’ah law, and they will do everything in their power to continue spreading their ideology as far and wide as they can.

    If the world truly wants to stop ISIS, there is only one way to do it:

    1. First and foremost, the U.S. government and its allies must be heavily pressured to cut all support to the rebels who are attempting to topple Assad. Even if these rebels that the U.S. is arming and funding were moderate, and they’re not, the fact that they are forcing Assad to fight a war on multiple fronts, only strengthens ISIS. This is lunacy.

    2. The Syrian government should be provided with financial support, equipment, training and intelligence to enable them to turn the tide against ISIS. This is their territory, they should be the ones to reclaim it.

    Now obviously this support isn’t going to come from the U.S. or any NATO country, but there are a number of nations who have a strategic interest in preventing another regime change and chaotic aftermath. If these countries respond promptly, as in right now, they could preempt a U.S. intervention, and as long this support does not include the presence of foreign troops, doing so will greatly reduce the likelihood of a major confrontation down the road.

    3. The U.S. government and its allies should should be aggressively condemned for their failed regime change policies and the individuals behind these decisions should be charged for war crimes. This would have to be done on an nation by nation level since the U.N. has done nothing but enable NATO aggression. While this may not immediately result in these criminals being arrested, it would send a message. This can be done. Malaysia has already proven this by convicting the Bush administration of war crimes in abstentia.

    Now you might be thinking: “This all sounds fine and good, but what does this have to do with me? I can’t influence this situation.”

    That perspective is quite common, and for most people, it’s paralyzing, but the truth of the matter is that we can influence this. We’ve done it before, and we can do it again.

    I’ll be honest with you though, this isn’t going to be easy. To succeed we have to start thinking strategically. Like it or not, this is a chess game. If we really want to rock the boat, we have to start reaching out to people in positions of influence. This can mean talking to broadcasters at your local radio station, news paper, or t.v. station, or it can mean contacting influential bloggers, celebrities, business figures or government officials. Reaching out to current serving military and young people who may be considering joining up is also important. But even if it’s just your neighbor, or your coworker, every single person we can reach brings us closer to critical mass. The most important step is to start trying.

    If you are confused about why this is all happening, watch this video we put out on September 11th, 2012

    If this message resonates with you then spread it. If you want to see the BIG picture, and trust me we’ve got some very interesting reports coming, subscribe to StormCloudsGathering on Youtube, and follow us on Facebook, twitter and Google plus.

    BONUS ARTICLE (an interesting tangent): Were the Libyan rebels being led by a CIA plant?

    via StormCloudsGathering

    Snowden Saga Decrypted: NSA Leaker or Distraction Double Agent?

    Snowden Saga Decrypted: NSA Leaker or Distraction Double Agent?

     

    Max Maverick breaks down everything we know, don’t know, and should be asking about this mainstream media ‘circus’ that has become of the Snowden NSA Leak Disclosure.

    Major Players – Hidden Hands

    Past NSA Leaks & Leakers

    Advanced Technologies Covered-Up

    Artificial Intelligence Disclosure

    Snowden Leak Pros & Cons

    The Attack on the Internet Itself

    What can be done about it?
     
     
    NSA Codenames & Intentions
    https://decryptedmatrix.com/live/raw-list-of-nsa-nicknames-and-codewords/

     
    Bruce SchneierThe NSA: Capabilities and Countermeasures

    Speaker: Bruce Schneier
    Edward Snowden has given us an unprecedented window into the NSA’s surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not the politics of their actions. This includes how it conducts Internet surveillance on the backbone, but is primarily focused on their offensive capabilities: packet injection attacks from the Internet backbone, exploits against endpoint computers and implants to exfiltrate information, fingerprinting computers through cookies and other means, and so on.

    I will then talk about what sorts of countermeasures are likely to frustrate the NSA. Basically, these are techniques to raise the cost of wholesale surveillance in favor of targeted surveillance: encryption, target hardening, dispersal, and so on.

    DEA Gets Unchecked Access To Call Records; Taught To Lie About Where They Got Them

    DEA Gets Unchecked Access To Call Records; Taught To Lie About Where They Got Them

    nsa_eyeShortly after the Snowden leaks began exposing the NSA’s massive collection efforts, the New York Times uncovered the DEA’s direct access to AT&T telecom switches (via non-government employee “analysts” working for AT&T), from which it and other law enforcement agencies were able to gather phone call and location data.

    Unlike the NSA’s bulk records programs (which are limited to holding five years worth of data), the Hemisphere database stretches back to 1987 and advertises instant access to “10 years of records.” And unlike the NSA’s program, there’s not even the slightest bit of oversight. All law enforcement needs to run a search of the Hemisphere database is an administrative subpoena — a piece of paper roughly equivalent to calling up Hemisphere analysts and asking them to run a few numbers. Administrative subpoenas are only subject to the oversight of the agency issuing them.

    It’s highly unlikely these administrative subpoenas are stored (where they could be accessed as public records) considering the constant emphasis placed on parallel construction in the documents obtained by Dustin Slaughter of MuckRock — documents it took the DEA ten months to turn over.

    Unlike the documents obtained by the New York Times (possibly inadvertently), these do contain a few redactions, including some apparent success stories compiled at the end of the presentation. But like the earlier documents, the documents show that the DEA and law enforcement have unchecked access to a database that agents and officers are never allowed to talk about — not even inside a courtroom.

    It is expected that all Hemisphere requests will be paralleled with a subpoena for CDRs from the official carrier for evidentiary purposes.

    It’s spelled out more explicitly on a later slide, listed under “Official Reporting.”

    DO NOT mention Hemisphere in any official reports or court documents.

    Judging from the request date, it would appear that this version of the Hemisphere presentation possibly precedes the New York Times’ version. However, this one does not name the cooperating telco, although that appears to be a deliberate choice of the person writing the presentation, rather than due to redaction. At one point the document declares Hemisphere can access records “regardless of carrier,” but later clarifies that it will only gather info that crosses certain telecom switches — most likely AT&T’s. Additional subpoenas will be needed to gather info from other carriers, as well as to obtain subscriber information linked to searched numbers. This small limitation plays right into the DEA’s insistence that HemispheDEAre be “walled off” from defendants, court systems and the public.

    If exigent circumstances make parallel construction difficult, Hemisphere analysts (non-government liaisons within the telco) will “continue to work with the investigator throughout the entire prosecution process in order to ensure the integrity of
    Hemisphere and the case at hand.” Analysts are allowed to advise investigators on report writing, presentations to prosecutors and issues occurring during the trial phase. The word “integrity” seems out of place when it describes non-government employees assisting government agencies in hiding the origin of evidence from other government agencies.

    Cross-referencing what’s been redacted in this one with the unredacted document published earlier, it appears as though the DEA is trying to (belatedly) hide the fact that its Hemisphere can also search IMSI and IMEI data (for wireless connections). Although this document states (after a long redaction) that Hemisphere does not collect subscriber information, that’s only partially true. As of July 2012, subscriber information for AT&T customers can be obtained from the database. This information may have been redacted or it may be that this presentation pre-dates this added ability.

    What this shows is that the DEA has access to loads of information and a policy of “parallel construction in all things.” Tons of other government agencies, including the NSA, FBI and CIA are funneling information to the DEA and instructing it to hide the origin. The DEA then demands law enforcement agencies around the nation to do the same thing. This stacks the deck against defendants, who are “walled off” from the chain of evidence, preventing them from challenging sources, methods or the integrity of the evidence itself.

    HEMISPHERE DOCUMENT 

    via TechDirt.com

    Blackwater Threatens to Kill State Dept Investigator, Trying to Investigate

    Blackwater Threatens to Kill State Dept Investigator, Trying to Investigate

    blackwater_xe_academiEven the mightiest have their come-uppance when their internal logic spews out destructiveness returning on the self—“blowback” in a way perhaps not seen before. I refer to James Risen’s extraordinary article in the New York Times, “Before Shooting in Iraq, a Warning on Blackwater,” (June 30), in which the customary meaning of “blowback” refers to policies, e.g., the invasions of Iraq and Afghanistan, the confrontation with Russia over Ukraine, the “pivot” of military power to the Pacific intent on the encirclement, containment, isolation of China, produce unintended, or if intended, still unwelcome, consequences for the initiator of the policy or action.

    Thus: Iraq, out-of-control (from the US standpoint, a raging civil war negating massive intervention and alerting the world to America’s hegemonic purposes); Afghanistan, original support of the Taliban against the Soviet Union, resulting in their material strengthening now turned against the US, endangering its power-position in the region; use of Ukraine as a basis for bringing NATO forces to the Russian border, now an overreach which may disrupt the EU and weaken US dominance over it; and blatant confrontation with China, both military and trade, with potential for war leading to nuclear annihilation. The status and role of world policeman is losing its blackjack, its reputation as global bully being challenged through the rise of multiple power-centers and industrial-commercial-financial patterns no longer defined, supervised, indeed controlled, by American global interests and military implementation.

    That is blowback in its familiar guise. Less so, the self-chosen instruments of repression spilling out of behemoth’s mouth because America’s dependence on repression to secure its aims makes it dependent as well on the executors of repression, in this case, given the extreme stress on privatization (the core of the monster’s functional existence), Blackwater at your service, a private army on hire to USG for pursuit of the dirty work, deemed necessary, yet, delegated to official forces, the cause of embarrassment and shame. Browbeating indigenous populations, with an overwhelming swagger and display in the grand tradition of conquerors, in addition to protecting representatives of the conquerors, is a mission worthy, as here, of billion dollar contracts to the private militias (euphemism: “security guards”) as insurance the military victory and occupation will hold.

    Here Blackwater is, and is treated as, inseparable from the intervention (read: conquest) itself, at times assisting in the fighting on an informal basis—it has not yet been invited to join NATO(!)—but more to the point, the intimidating presence in the post-military phase, as though instilling the message: You Iraqis think the military is bad, well don’t mess around, for far worse awaits you, we former Navy SEALS know nothing can touch us. Our motto might as well be, A Law Unto Ourselves, even USG—beyond the status-of-forces agreement it forced your government to sign—afraid of us. Blowback: the cancer in the bowels of behemoth rapidly spreading to the extremities, spinal column, brain. Soon we shall all be made over in the image of Blackwater, or rather, as Blackwater would like to see, as its actions show, America become, a nation subservient to its thugs, extolling martial glory for its own sake and for the sake of global dominance. Authoritarianism once off the ground knows no limits and demands the complete adherence of its subjects. America has lived with CIA for decades; Blackwater is icing on the cake.

    ***

    Before turning to the evidence contained in James Risen’s article, it is important to see how events from the past are converging on the present. His credentials as a whistleblower are borne out by his previous record (exposure of CIA dirty tricks, in his book State of War, with respect to Iran’s nuclear program) and current circumstances (he faces a possible jail sentence for refusing to disclose, from that account, the identity of an anonymous source). In the Bush doghouse for exposing the use of warrantless wire taps in 2005, and now, Obama contemplating more serious action, jail time for not complying with a DOJ subpoena, possibly leading to an Espionage Act prosecution, for which Obama excels over all of his predecessors combined (liberals, of course, furiously denying the sordid record), Risen not only stares down his persecutors, Obama, Holder, DOJ, but here presents an exposure in some ways more damning of US baseness from the top down, nurturing a murderous nest in the structure of government.

    As for the administration hounding, Jonathan Mahler’s New York Times article, “Reporter’s Case Poses Dilemma for Justice Dept.,” (June 27), implies that Risen’s refusal to be intimidated is causing Obama and Holder second thoughts about pushing for his imprisonment. According to John Rizzo, CIA’s acting general counsel, Bush people wanted State of War kept off the market—too late, however. Risen then was subpoenaed to testify against the suspected leaker—and refused. “More than six years of legal wrangling,” in what Mahler terms “the most serious confrontation between the government and the press in recent history,” is coming to a head. Risen “is now out of challenges. Early this month, the Supreme Court declined to review his case, a decision that allows prosecutors to compel his testimony.”

    But The Times, in defending its own man, cannot strongly protest, lest it antagonize the White House. Yes, Obama appears to be in a bind: “Though the court’s decision looked like a major victory for the government, it has forced the Obama administration to confront a hard choice. Should it demand Mr. Risen’s testimony and be responsible for a reporter’s being sent to jail? Or reverse course and stand down, losing credibility with an intelligence community that has pushed for the aggressive prosecution of leaks?” If Obama and USG were truly democratic (small “d”), there should not be a choice but only one course of action, moreover reigning in the “intelligence community” serving under their control.

    The reporter, I believe reflecting the paper’s view, however, credits the Obama administration with actually weighing alternatives and being capable of making moral choices: “The dilemma comes at a critical moment for an administration that has struggled to find a balance between aggressively enforcing laws against leaking and demonstrating concern for civil liberties and government transparency.” What balance? What concern? Everything points the other way, on both civil liberties (e.g., due process and habeas corpus rights for detainees) and government transparency (simply, a thick protective shield in place, symbolized by the high art of redaction—and, as with Blackwater’s killing sprees, the refusal or half-heartedness about prosecution). Its reporter’s back against the wall, NYT ignores the Espionage Act prosecutions of whistleblowers.

    Mahler succinctly describes the reporting: “The failed C.I.A. action at the heart of Mr. Risen’s reporting was intended to sabotage Iran’s nuclear weapons program. Intelligence officials assigned a former Russian scientist who had defected to the United States to deliver a set of faulty blueprints for a nuclear device to an Iranian scientist. But the Russian scientist became nervous and informed the Iranians that the plans were flawed.” One readily appreciates the dangers to the National Security State, especially revelations of the stupidity and dangerousness of its crown jewel, CIA, posed by investigative journalism. The Times, to its everlasting shame, bowed to Coldoleezza Rice’s request to withhold publication of the article. As a Times spokesperson later declared, “We weighed the government’s concerns and the usual editorial considerations and decided not to run the story.” Hence, James Risen—enemy of National Security; he “broke the story” later in State of War. Yet Bush is not the only culprit in this story; Obama ordered two additional subpoenas to force Risen to testify, his DOJ going after him hammer-and-tongs: “After a trial court largely quashed his third subpoena [the first under Bush] in late 2010, the Justice Department successfully challenged the ruling in a federal appeals court, arguing that the First Amendment does not afford any special protections to journalists.” Enough said about the dedication to civil liberties and freedom of the press: “The administration then urged the Supreme Court not to review Mr. Risen’s case.”

    ***

    iraq-blackwater-civilians-killedI have already discussed the mass killings in Nisour Square, Baghdad, in a previous article. Now we learn that this was part of a pattern in Blackwater’s behavior—again, Risen’s reporting. Even for one who is a seasoned critic, it is painful for me to write about. Organized thuggery knows no limits particularly when working for the highest authority, immunity from punishment worn as a badge of honor, as meanwhile government officials hide their eyes. Risen writes, “Just weeks before Blackwater guards fatally shot 17 civilians in Baghdad’s Nisour Square in 2007, the State Department began investigating the security contractor’s operations in Iraq. But the inquiry was abandoned after Blackwater’s top manager there issued a threat: ‘that he could kill’ the government’s chief investigator and ‘no one could or would do anything about it as we were in Iraq,’ according to department reports.” A private contractor threatens the life of a State Department investigator! No reprisal, punishment, cancellation of the contract, not even disclosure of the threat—yet Blackwater still in place years later, as part of the silence on atrocities in the Obama-Hillary era.

    Those 17 killed are on America’s hands, bloody hands. There was a clear warning about what to expect: “After returning to Washington, the chief investigator wrote a scathing report to State Department officials documenting misconduct by Blackwater employees and warning that lax oversight of the company, which had a contract worth more than $1 billion to protect American diplomats, had created ‘an environment full of liability and negligence.’” Even more outrageous, Risen notes, the investigators become the criminals gumming up the security works: “American Embassy officials in Baghdad sided with Blackwater rather than the State Department investigators as a dispute over the probe escalated in August 2007, the previously undisclosed documents show. The officials told the investigators that they had disrupted the embassy’s relationship with the security contractor and ordered them to leave the country, according to the reports.”

    Jean Richter, lead investigator, wrote, in a memo to the State Department only weeks prior to Nisour Square: “’The management structures in place to manage and monitor our contracts in Iraq have become subservient to the contractors themselves. Blackwater contractors saw themselves as above the law…. ‘hands off’ [management meant that] the contractors, instead of Department officials, are in command and in control.’” Now, nearly seven years later, four Blackwater guards are on trial, facing, if ever convicted, watered down charges, this being “ the government’s second attempt to prosecute the case in an American court [I wonder how serious the effort under Holder and Obama] after previous charges against five guards were dismissed in 2009.” Much of the time this is on Obama’s watch, yet, “despite a series of investigations in the wake of Nisour Square, the back story of what happened with Blackwater and the embassy in Baghdad before the fateful shooting has never been fully told.”

    So much for transparency, civil liberties, and prosecuting the crimes of a predecessor (the cardinal rule of presidents, at least this one, cover-up WAR CRIMES past and present, a solemn command of the National Security State). Silence and deniability, in all matters large and small, characterize the responses of USG and private principals: “The State Department declined to comment on the aborted investigation. A spokesman for Erik Prince, the founder and former chief executive of Blackwater, who sold the company in2010, said Mr. Prince had never been told about the matter.” The $1B contract itself testifies to the fusion of patriotism, secrecy, repression, and yes, corporate profit: “After Mr. Prince sold the company, the new owners named it Academi. In early June, it merged with Triple Canopy, one of its rivals for government and commercial contracts to provide private security. The new firm is called Constellis Holdings.” Like war, private security stands to make a killing (pardon the pun), no doubt in flight from the original name for damage-control and public-relations purposes.

    Previous to Nisour Square (Sept. 16, 2007) Blackwater guards “acquired a reputation…for swagger and recklessness,” but complaints “about practices ranging from running cars off the road to shooting wildly in the streets and even killing civilians typically did not result in serious action by the United States or the Iraqi government.” After firing in the Square, there was closer scrutiny, the Blackwater claim that they were fired on even US military officials denied, and “[f]ederal prosecutors later said Blackwater personnel had shot indiscriminately with automatic weapons, heavy machine guns and grenade launchers.” To no avail, given the symbiotic relationship between the company and the government. In fact, Blackwater had itself been run by Prince as a nation in microcosm, its people shortly before Nisour Square gathered by him at company headquarters in Moyock, North Carolina and made to “swear an oath of allegiance” like the one required of enlistees in the US military. They were handed copies of the oath, which, after reciting the words, were told to sign.

    The State Department investigation into Blackwater in Iraq, which began Aug. 1, 2007 and was slated for one month, led early to the “volatile” situation (including the death threat), our knowledge coming from “internal State Department documents” furnished “to plaintiffs in a lawsuit against Blackwater that was unrelated to the Nisour Square shootings,” seemingly by accident then and fleshed out by Risen. In that month—or that part of it before being forced to leave– the investigators discovered “a long list of contract violations by Blackwater,” staffing changes of security details “without State Department approval,” reducing the number of guards on details, “storing automatic weapons and ammunition in their private rooms, where they were drinking heavily and partying with frequent female visitors,” and, for many, failing “to regularly qualify on their weapons” or “carrying weapons on which they had never been certified” nor “authorized to use.” Extravagance for mayhem abroad, less than peanuts for critical needs at home, education, health care, employment, beyond the means or reach of Imperial grandeur as the national obsession.

    In addition to “overbilling the State Department by manipulating its personnel records, using guards assigned to the State Department contract for other work and falsifying other staffing data on the contract,” (no wonder the investigators’ poor reception by Blackwater’s resident head in Iraq), one of its affiliates forced “third country nationals” who did the dirty work at low wages “to live in squalid conditions, sometimes three to a cramped room with no bed,” according to the investigators’ report. Their conclusion: “Blackwater was getting away with such conduct because embassy personnel had gotten too close to the contractor.”

    Ah, the denouement; we have a name to go with the face of the project manager who threatened Richter’s life, Daniel Carroll, who said he could kill him without anything happening to himself “as we were in Iraq” (this was witnessed by Donald Thomas, the other investigator), and Richter, in his memo to the Department stated: “I took Mr. Carroll’s threat seriously. We were in a combat zone where things can happen unexpectedly, especially when issues involve potentially negative impacts on a lucrative security contract.” Nicely put, and corroborated by Thomas, who wrote in a separate memo that “others in Baghdad had told the two investigators to be ‘very careful,’ considering that their review could jeopardize job security for Blackwater personnel.” The wonder perhaps is that Richter and Thomas were not prosecuted under the Espionage Act for spoiling the show. It didn’t matter. No one at State listened.

    The two men were ordered to leave (Aug 23), and “cut short their inquiry and returned to Washington the next day.” Finally, on Oct. 5, after the Nisour Square scandal, State Department officials responded to Richter’s “August warning,” and took statements from him and Thomas about “their accusations of a threat by Mr. Carroll, but took no further action.” A special panel convened by Rice on Nisour Square “never interviewed Mr. Richter or Mr. Thomas.” The official who led the panel “told reporters on Oct. 23, 2007, that the panel had not found any communications from the embassy in Baghdad before the Nisour Square shooting that raised concerns about contractor conduct.” Voila, vanished in thin air. This State Department officer deserves the last word: “We interviewed a large number of individuals. We did not find any, I think, significant pattern of incidents that had not—that the embassy had suppressed in any way.” And my last word: fascism. Beyond all structural-cultural-societal considerations about wealth-concentration, industrial-financial consolidation, foreign expansion through preponderant power and the spirit of militarism, the rampaging privatization with government consent witnessed here, which has wreaked havoc on another people, only to be covered over by the state, aka, the National Security State, disregarding its Constitutional protections to the individual, as in sponsoring massive surveillance, is enough for me to satisfy the working definition of that single word.

    via Norman Pollack has written on Populism. His interests are social theory and the structural analysis of capitalism and fascism. He can be reached at [email protected].

    August 26, 2013 – Decrypted Matrix Radio: Syria WMDs, Celldar 2002, CIA Helped Saddam, Brain Hacking, Monsanto Dumped, Rap Game-Changer, NSA Meanings, REAL Spies

    Syria – WMDs Redux!

    Rense Reminds of ‘Celldar’ Advanced Spying Techniques – FlashBack 2002!

    CIA Files Prove U.S. Helped Saddam During Chemical Attacks On Iran

    Mylee Cyrus – Controversy by Design

    DARPA Wants Portable Brain Recorders “In Every Classroom in America”
    CLIP: Mark dice on Brain Hacking

    GREAT NEWS: Insider Traders Begin Dumping Monsanto Stocks as Reality of GMOs Sinks in Across Wall Street

    “The Secret Meeting that Changed Rap Music and Destroyed a Generation”

    How to Decode the True Meaning of What NSA Officials Say

    8 real spies treated better than Manning 8 real spies treated better than Manning

    May 21, 2013 – Decrypted Matrix Radio: Tornado Distraction, Google Tax Cheats, Coconut Water Benefits, Spotting Fakes, China Hacks, CIA’s Bin Laden Cover

    Tornado Distraction? Scandals Avoided – FEMA Saves the Day!

    Google’s ‘massive, immoral tax avoidance exposed’

    CLIP: Joe Rogan & The Pharmaceutical Industry: Prescribing Happiness

    The Goodness of Coconut Water For Replenishment and Weight Loss

    Vaccine Injured Children in Small African Village Used Like Lab Rats

    Signs of A Fake Guru: Weeding Out the Psychopaths from the True Teachers

    Chinese Hackers Who Breached Google Gained Access to Data on U.S. Surveillance Targets

    India bans captive dolphin shows, says dolphins should be seen as ‘non-human persons’

    The CIA withholds 52 photos requested by JudicialWatch through a Freedom of Information Act request, raising suspicion that Bin Laden was likely never killed in the official “raid”

    Every Week Night 12-1am EST (9-10pm PST)

    – Click Image to Listen LIVE –

    May 6, 2013 – Decrypted Matrix Radio: Syria Chemical False Flag, CIA UFO Confession, Obama Tyranny Comments, RoboBees Live, Quantum Internet, Bomber Intel Links, First 3D Printed Gun

    Former Bush Regime Official: Chemical Weapons Use in Syria May Be Israeli False Flag Operation

    CIA Officer Deathbed Confession on UFO Cover-UP, Area 51

    Roswell Evidence Details, Anti-Gravity Connection

    Obama Tells Students to REJECT Voices Warning of Government Tyranny – Ohio State University

    RoboBee ‘Drones’ – Monsanto GMO Bees

    Government Lab Reveals It Has Operated Quantum Internet For Over Two Years

    Even more CIA/FBI links to Boston Bombers – Graham Fuller, Uncle Ruslan, Skull n’ Bones

    The World’s First Entirely 3D-Printed Gun (Needs a Nail for the Firing Pin)

    Every Week Night 12-1am EST (9-10pm PST)

    – Click Image to Listen LIVE –

    April 30, 2013 – Decrypted Matrix Radio: Boston Futher Exposed, False Flag Actors, Spying Tech Boost, Insider Leak Updates, Sociopath CEO’s

    April 30, 2013 – Decrypted Matrix Radio: Boston Futher Exposed, False Flag Actors, Spying Tech Boost, Insider Leak Updates, Sociopath CEO’s

    Techno Tuesday!

    Toulouse: Anonymous Theme Song – by Nicky Romero

    Bomber Updates – CIA Training

    Sandy Hook Principle Re-Used as Actor?

    Evidence of CRAFT Mercenaries

    Training Drill Denials, Tsarnev Family benefits 100k from feds!?

    Tsaranev Brother DIED in custody??

    False Bomber ID – NOW DEAD???

    Journalist investigates new Security Tech ‘Total Recall’ onsite at the Statue of Liberty NYC

    Massive US push for full internet surveillance. CISPA-like zombie bills only die to respawn!

    BodyPopper: by Deekline & Wizard

    Interesting Benjamin Fulford Updates

    Sociopath Nestle CEO: “Water Not a Human Right & should be privatized”

     

    Every Week Night 12-1am EST (9-10pm PST)

    – Click Image to Listen LIVE –

    April 17, 2013 – Decrypted Matrix Radio: Examining Boston Culprits, FBI Foreknowledge, Major Batter Tech, DHS Takeover, Michael Hayden Admits, Anti-2nd Hypocrit Actors

    Boston Bombing Culprits Identified? Examining all the Before & After Analysis

    Esoteric Woman Warns Boston Runners: ‘You’re Going to Die’

    New lithium-ion battery design that’s 2,000 times more powerful, recharges 1,000 times faster

    CLIP: CIA Director Michael Hayden: “US is run by Intel. Agencies” – YouTube

    Seattle Has Been Taken Over By The Department Of Homeland Security

    CLIP: Ben Swann Reality Check: Did the FBI know about Boston bombing beforehand?

    The Second Amendment must go, tweets Jerry Maguire actor Jay Mohr in anti-gun rant

    Every Week Night 12-1am EST (9-10pm PST)

    – Click Image to Listen LIVE –

    11 Secret Documents Americans Deserve to See

    11 Secret Documents Americans Deserve to See

    top-secret-documents

    Many documents produced by the U.S. government are confidential and not released to the public for legitimate reasons of national security.  Others, however, are kept secret for more questionable reasons.  The fact that presidents and other government officials have the power to deem materials classified provides them with an opportunity to use national security as an excuse to suppress documents and reports that would reveal embarrassing or illegal activities.

     

    I’ve been collecting the stories of unreleased documents for several years. Now I have chosen 11 examples that were created—and buried—by both Democratic and Republican administrations and which cover assassinations, spying, torture, 50-year-old historical events, presidential directives with classified titles and…trade negotiations.

     

    1. Obama Memo Allowing the Assassination of U.S. Citizens      

    When the administration of George W. Bush was confronted with cases of Americans fighting against their own country, it responded in a variety of ways. John Walker Lindh, captured while fighting with the Taliban in December 2001, was indicted by a federal grand jury and sentenced to 20 years in prison. José Padilla was arrested in Chicago in May 2002 and held as an “enemy combatant” until 2006 when he was transferred to civilian authority and, in August 2007, sentenced to 17 years in prison for conspiring to support terrorism. Adam Gadahn, who has made propaganda videos for al-Qaeda, was indicted for treason in 2006 and remains at large.

     

    After he took over the presidency, Barack Obama did away with such traditional legal niceties and decided to just kill some Americans who would previously have been accused of treason or terrorism. His victims have included three American citizens killed in Yemen in 2011 by missiles fired from drones: U.S.-born anti-American cleric Anwar al-Awlaki, Samir Khan, an al-Qaeda propagandist from North Carolina, and Awlaki’s 16-year-old son, Abdulrahman al-Awlaki.

     

    Obama justified his breach of U.S. and international law with a 50-page memorandum prepared by the Justice Department’s Office of Legal Counsel.  Attorney General Eric Holder argued that the killing of Awlaki was legal because he was a wartime enemy and he could not be captured, but the legal justification for this argument is impossible to confirm because the Obama administration has refused to release the memo.

     

    2. The Obama Interpretation of Section 215 of the Patriot Act

    Section 215 of the Patriot Act allows the FBI, in pursuit of spies and terrorists, to order any person or entity to turn over “any tangible things” without having to justify its demands by demonstrating probable cause. For example, a library can be forced to reveal who borrowed a book or visited a web site. According to Section 215, the library is prohibited from telling anyone what it has turned over to the FBI.

     

    The Obama administration has created a secret interpretation of Section 215 that goes beyond the direct wording of the law to include other information that can be collected. Democratic Senator Ron Wyden of Oregon, who, as a member of the Senate Intelligence Committee, was briefed about this secret interpretation, urged the president to make it public. “I want to deliver a warning this afternoon,” he said. “When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry.”

     

    Wyden and Sen. Mark Udall of Colorado, also a Democrat, have implied that the Obama administration has expanded the use of Section 215 to activities other than espionage and terrorism. In a letter to Attorney General Eric Holder, Wyden and Udall wrote that “there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows. This is a problem, because it is impossible to have an informed public debate about what the law should say when the public doesn’t know what its government thinks the law says.”
    3. 30-page Summary of 9/11 Commission Interview with Bush and Cheney

    You would have thought that, in the interests of the nation, the Bush administration would have demanded a thorough investigation of the terrorist attacks of September 11, 2001, the deadliest assault ever on U.S. soil. Instead, they fought tooth and nail against an independent investigation. Public pressure finally forced President George W. Bush to appoint a bipartisan commission that came to be known as the 9/11 Commission.  It was eventually given a budget of $15 million…compared to the $39 million spent on the Monica Lewinsky/Bill Clinton investigation. When the commission completed its work in August 2004, the commissioners turned over all their records to the National Archives with the stipulation that the material was to be released to the public starting on January 2, 2009. However, most of the material remains classified. Among the more tantalizing still-secret documents are daily briefings given to President Bush that reportedly described increasingly worried warnings of a possible attack by operatives of Osama bin Laden.

     

    Another secret document that the American people deserve to see is the 30-page summary of the interview of President Bush and Vice-President Dick Cheney conducted by all ten commissioners on April 29, 2004.  Bush and Cheney refused to be interviewed unless they were together. They would not testify under oath and they refused to allow the interview to be recorded or transcribed.  Instead the commission was allowed to bring with them a note taker. It is the summary based on this person’s notes that remains sealed.

     

    4. Memos from President George W. Bush to the CIA Authorizing Waterboarding and other Torture Techniques

    Four days after the terrorist attacks of September 11, 2001, President George W. Bush signed a “memorandum of notification” (still secret) that authorized the CIA to do what it needed to fight al-Qaeda.  However the memo did not address what interrogation and torture techniques could be used on captured suspects. By June 2003, Director George Tenet and others at the CIA were becoming worried that if their seemingly illegal tactics became known to the public, the White House would deny responsibility and hang the CIA out to dry.  After much discussion, Bush’s executive office handed over two memos, one in 2003 and another in 2004, confirming White House approval of the CIA interrogation methods, thus giving the CIA “top cover.” It is not known if President Bush himself signed the memos.

     

    5. 1,171 CIA Documents Related to the Assassination of President Kennedy

    It’s been 49 years since President John F. Kennedy was shot to death in Dallas, yet the National Archives and Records Administration (NARA) insists that more than one thousand documents relating to the case should not be released to the public until NARA is legally required to do so in 2017…unless the president at that time decides to extend the ban.  It would appear that some of the blocked material deals with the late CIA agent David Phillips, who is thought to have dealt with Lee Harvey Oswald in Mexico City six weeks before the assassination.

     

    6. Volume 5 of the CIA’s History of the Bay of Pigs Fiasco

    In the late 1970s and early 1980s, CIA historian Dr. Jack B. Pfeiffer compiled a multi-volume history of the failed US attempt to invade Cuba in April 1961.  In August 2005, the National Security Archive at George Washington University, citing the Freedom of Information Act, requested access to this history.  The CIA finally released the information almost six years later, in July 2011. However it refused to release Volume V, which is titled “CIA’s Internal Investigation of the Bay of Pigs Operations.”  Although more than 50 years have passed since the invasion, the U.S. District Court for the District of Columbia ruled that Volume V is exempt from the Freedom of Information Act because it “is covered by the deliberative process privilege” which “covers documents reflecting advisory opinions, recommendations and deliberations comprising part of a process by which governmental decisions and policies are formulated.”

     

    7. National Security Decision Directives with Classified Titles

    The day before he left the White House on January 20, 1993, President George H. W. Bush issued National Security Directive (NSD) #79, a document so secret that even its title remains classified almost 20 years later. The same goes for National Security Directive #77, issued a few days earlier, as well as four others issued in 1989 (#11, 13a, 19a and 25a). If the “a”s are any indication of the subjects, it is worth noting that NSD 13 dealt with countering cocaine trafficking in Peru; NSD 19 dealt with Libya and NSD 25 with an election in Nicaragua.

     

    President Ronald Reagan also issued six NSDs with classified titles, and President Bill Clinton issued 29.  President George W. Bush issued two such NSDs, presumably shortly after the terrorist attacks of September 11, 2001. President Barack Obama has issued at least seven Presidential Policy Directives with classified titles.

     

    8. Major General Douglas Stone’s 700-Page Report on Prisoners Held in Afghanistan

    Marine Corps General Douglas Stone earned positive reviews for his revamping of detention operations in Iraq, where he determined that most of the prisoners held by the United States were not actually militants and could be taught trades and rehabilitated. Based on his success in Iraq, Stone was given the task of making an evaluation of detainee facilities in Afghanistan. His findings, conclusions and recommendations were included in a 700-page report that he submitted to the U.S. Central Command in August 2009. According to some accounts of the report, Stone determined that two-thirds of the Afghan prisoners were not a threat and should be released. However, three years after he completed it, Stone’s report remains classified.

     

    9. Detainee Assessment Briefs for Abdullah Tabarak and Abdurahman Khadr

    In 2011, WikiLeaks released U.S. military files known as Detainee Assessment Briefs (DABs), which describe the cases of 765 prisoners held at Guantánamo Bay. However, there were actually 779 prisoners. So what happened to the files for the other fourteen? Andy Worthington, author of The Guantanamo Files, has noted that two of the fourteen missing stories are especially suspicious: those of Abdullah Tabarak and Abdurahman Khadr.

     

    Tabarak, a Moroccan, was allegedly one of Osama bin Laden’s long-time bodyguards, and took over bin Laden’s satellite phone in order to draw U.S. fire to himself instead of to bin Laden when U.S. forces were chasing the al-Qaeda leader in the Tora Bora mountains in December 2001.  Captured and sent to Guantánamo, Tabarak was mysteriously released, sent back to Morocco in July 2003, and set free shortly thereafter.

     

    Abdurahman Khadr, the self-described “black sheep” of a militant family from Canada, was 20 years old when he was captured in Afghanistan and turned over to American forces. He has said that he was recruited by the CIA to become an informant at Guantánamo and then in Bosnia. When the CIA tried to send him to Iraq, he refused and returned to Canada. His younger brother, Omar, was 15 years old when he was captured in Afghanistan and accused of killing an American soldier, Sergeant First Class Christopher Speer, during a firefight.  He was incarcerated at Guantánamo for almost ten years until he was finally released to Canadian custody on September 29, 2012.

     

    10. FBI Guidelines for Using GPS Devices to Track Suspects

    On January 23, 2012, in the case of United States v. Jones, the Supreme Court ruled unanimously that attaching a GPS device to a car to track its movements constitutes a “search” and is thus covered by the Fourth Amendment protecting Americans against “unreasonable searches and seizures.”  But it did not address the question of whether the FBI and other law enforcement agencies must obtain a warrant to attach a GPS device or whether it is enough for an agent to believe that such a search would turn up evidence of wrongdoing.

     

    A month later, at a symposium at the University of San Francisco, FBI lawyer Andrew Weissman announced that the FBI was issuing two memoranda to its agents to clarify how the agency would interpret the Supreme Court decision. One memo dealt with the use of GPS devices, including whether they could be attached to boats and airplanes and used at international borders. The second addressed how the ruling applied to non-GPS techniques used by the FBI.

     

    The ACLU, citing the Freedom of Information Act, has requested publication of the two memos because they “will shape not only the conduct of its own agents but also the policies, practices and procedures of other law enforcement agencies—and, consequently, the privacy rights of Americans.”

     

    11. U.S. Paper on Negotiating Position on the Free Trade Agreement of the Americas

    The subject of international trade negotiations is one that makes most people’s eyes glaze over. So why is the Obama administration fighting so hard to keep secret a one-page document that relates to early negotiations regarding the Free Trade Agreement of the Americas (FTAA), an accord that was proposed 18 years ago and about which public negotiations ended in 2005? All we know is that the document “sets forth the United States’ initial proposed position on the meaning of the phrase ‘in like circumstances.’” This phrase “helps clarify when a country must treat foreign investors as favorably as local or other foreign investors.”

     

    Responding to a Freedom of Information Act lawsuit filed by The Center for International Environmental Law, DC District Judge Richard W. Roberts ordered the Office of the United States Trade Representative (USTR) to release the document, but the Obama administration has refused, claiming that disclosure “reasonably could be expected to result in damage to the national security” because all the nations involved in the failed negotiations agreed to keep all documents secret until December 31, 2013…“unless a country were to object to the release of one of its own documents at that time.” Judge Roberts ruled that the USTR has failed to present any evidence that release of the document would damage national security.

     

    Most likely, the Obama administration is afraid that release of the document would set a precedent that could impede another secret trade negotiation, the Trans-Pacific Partnership (TPP), also known as the Trans-Pacific Strategic Economic Partnership Agreement, which seeks to establish a free trade zone among the U.S., New Zealand, Chile, Singapore, Brunei, Australia, Peru, Vietnam, Malaysia and possibly Canada, Mexico and Japan.

    Did CIA and State Department Run Illegal Arms Trafficking in Benghazi?

    Did CIA and State Department Run Illegal Arms Trafficking in Benghazi?

    benghazi-trafficking-coverup

    New details have emerged that shed light on the chaos that embroiled the Benghazi mission on 9/11/2012 that led to the murder of Ambassador Christopher Stevens and three other Americans at the hands of the very anti-Qaddafi rebels that Stevens formally liaised with for the CIA.

    It wasn’t a secret that Ambassador Christopher Stevens played a key role in Libya’s “Arab Spring.” During the course of the revolution that ultimately toppled Muammar Qaddafi, Stevens’ built a relationship with the Libyan rebels and it’s this experience that made him the frontrunner for the Libyan ambassadorship. Stevens’ history of working with Libyan radicals provided the perfect opportunity for the Obama administration to covertly move newly purchased weapons from Libya’s freedom fighters to Syrian insurgents via ships through Turkey.

    In March 2011 Stevens became the official U.S. liaison to the al-Qaeda-linked “Libyan opposition, working directly with Abdelhakim Belhadj of the Libyan Islamic Fighting Group—a group that has now disbanded, with some fighters reportedly participating in the attack that took Stevens’ life.”

    Former CIA officer Clare Lopez said, “That means Stevens was authorized by the U.S. Department of State and the Obama administration to aid and abet individuals and groups that were, at a minimum, allied ideologically with al-Qaeda, the jihadist terrorist organization that attacked the homeland on the first 9/11, the one that’s not supposed to exist anymore after the killing of its leader, Osama bin Laden, on May 2, 2011.”

    Obama’s weapon buyback program in Libya

    Couple this with the weapon buyback program offered by the Obama administration and there’s a recipe for catastrophe.

    Shortly after the October 2011 death of Qaddafi, Secretary of State Hillary Clinton announced in Tripoli that the U.S. was committing $40 million to help Libya “secure and recover its weapons stockpiles.” Department of State Assistant Secretary Andrew Shapiro confirms DOS had a weapons buy-back program in Libya that was also supported by the UK who gave $1.5 million, the Netherlands gave $1.2 million, Germany gave about $1 million and our neighbor to the north, Canada gave $1.6 million to purchase the deadly arsenal that went missing after the fall of Qaddafi.

    The State Department was specifically looking to acquire the 20,000 MANPADS (they are commonly known as man-portable air shoulder-fire missiles) that went missing once Qaddafi was killed.

    State Department Assistant Secretary, for Political-Military affairs, Andrew Shapiro said, they did not know how many MANPADs remained missing, but admitted it was a significant number.

    “Many militia groups remain reluctant to relinquish them,” Shapiro said. He did say that the U.S. has recovered about 5,000 MANPADs earlier this year.

    Repeated calls and emails went unanswered to the State Department and Shapiro regarding an update on the weapon buyback program as well as what the State Department did with the weapons they purchased.

    Russia and China complained of U.S. arms trafficking in Syria

    Another curious piece to this puzzle is Russia. Did they have a part to play inside Benghazi and was presidential contender, Mitt Romney right that Russia remains a threat to the U.S.? (Story by this reporter here)

    The Russian response, under former KGB Cold War foe Valdimir Putin, who was visibly incensed last fall when a jubilant crowd of rebels murdered his ally, Muammar Qaddafi, has described the event as “repulsive and disgusting.”

    Shortly after the death of U.S. ambassador in Libya, numerous Russian commentators used social media to describe their position on the destabilization in Libya.

    “The democratized residents of Libya thanked the staff of the American Embassy for its support,” one Tweet read. “This is what you call exporting democracy, it seems. America gives Libya a revolution, and Libyans, in return, kill the ambassador.”

    Aleksei K. Pushkov, the head of Russia’s parliamentary Foreign Affairs Committee, wrote via Twitter: “Under Qaddafi they didn’t kill diplomats. Obama and Clinton are in shock? What did they expect – ‘Democracy?’ Even bigger surprises await them in Syria,” aNew York Times story read in September.

    It is no secret that Putin disagreed with the West’s view of Syrian ruler Assad. When Putin was Prime Minister, he delivered a scathing criticism of the Libya bombing by NATO and left the impression that under his leadership it would have never happened.

    It’s also worth pointing out that Russia and China have consistently opposed any military intervention in Syria. Russia and its allies have repeatedly warned the West that efforts to aid Syrian rebels would only bring more bloodshed to an already embattled region. Also, the Russians have been demanding a cessation of U.S. aid to the Syrian rebels fighting President Assad, again noting that any military aid would destabilizes the entire region, and could have serious economic consequences for Russia.

    Even Russian Foreign Minister Sergei Lavrov cautioned the West against arming the Syrian rebels. However, theArab Times news agency said, “Western officials say that Russia’s vetoes have abetted the Syrian violence by encouraging Assad to pursue an offensive with his Russian-supplied armed forces to crush the popular revolt. Saudi Arabia and Qatar are believed to have funded arms shipments.”

    Case in point, in late August Russia said there was increasing evidence that Syrian rebels were procuring large numbers of Western-made weapons. They even suggested that America and other EU countries were spurring the violence in Syria.

    So was Benghazi a message delivered by the Russians to end U.S. gun-running by executing Ambassador Stevens, the kingpin between the armed groups, the Libya stockpiles, and the shipments to Turkey?

    Reports are abundant and U.S. acknowledged guns went to Al Qaeda

    Despite evidence to the contrary, a State Department spokeswoman rejected the idea of arms trafficking, saying Ambassador Stevens was in Benghazi for diplomatic meetings, and the opening of a new cultural center.

    The State Department response rings hollow, however, since the Times of London reported that a Libyan Al Entisar ship was found carrying at least 400 tons of cargo. “Some of it was humanitarian, but also reportedly weapons, described by the report as the largest consignment of weapons headed for Syria’s rebels on the frontlines.”

    Middle East expert, Walid Phares confirmed the ship was carrying “a lot of weapons.”

    Also former CIA Director Porter Goss told Fox News that some of the weapons from the Libya uprising are making their way to Syria. Goss claimed that the U.S. intelligence is aware of the networking given their presence in Benghazi and throughout the region.

    “I think there’s no question that there’s a lot of networking going on. And … of course we know it,” he said. Unfortunately, many of those weapons shipped through Turkey to Syria ended up in the hands of al-Qaeda.

    Not so long ago, America armed the Taliban with shoulder-fire missiles to fight a proxy war against the Russians only to find those weapons being used to kill Americans during the “war on terror.” This illustrates once again that arming enemies is never a good idea.

    Middle East experts contend the Muslim Brotherhood and its proxy, Libyan Islamic Fighting Group (LIFG) leader Abdulhakim Belhadj, were in direct contact with Stevens and provided information as to which rebel groups in Libya and Syria deserved American trust and more importantly, weapons.

    Proof comes from the 2010 classified cablefrom Stevens that read in part: Development Foundation brokered talks with imprisoned members of the Libyan Islamic Fighting Group (LIFG) that led to the release earlier this year of about 130 former LIFG members. The GOL (Government of Libya) considers the program an important means to signal willingness to reconcile with former enemies, a significant feature of Libya’s tribal culture.”

    The Business Insider wrote a story focusing on the export of fighters. “If the new Libyan government was sending seasoned Islamic fighters and 400 tons of heavy weapons to Syria through a port in southern Turkey—a deal brokered by Stevens’ primary Libyan contact during the Libyan revolution—then the governments of Turkey and the U.S. surely knew about it.

    Another portion of the 2010 classified cable says, “Libya also cooperates closely with Syria, particularly on foreign fighter flows. Syria has transferred over 100 Libyan foreign fighters to the GOL’s custody over the past two years, including a tranche of 27 in late 2007. Our assessment is that the flow of foreign fighters from Libya to Iraq and the reverse flow of veterans to Libya has diminished due to the GOL’s cooperation with other states and new procedures. Counter-terrorism cooperation is a key pillar of the U.S.-LIBYA bilateral relationship and a shared strategic interest.”

    Crowds outside Benghazi mission were presumed buy-back customers

    It’s been months since the 9/11 Benghazi attack and no official conclusions have been released. After last week’s Congressional closed-door intelligence briefing, many lawmakers emerged wondering why Ambassador Stevens was not more concerned with the growing boisterous rebel crowd outside the mission’s gates shortly before the attack that would kill him?

    Retired Army Lieutenant Colonel and Defense Intelligence Agency operative Anthony Shaffer says he knows the answer. “The Ambassador was expecting a weapon buyback deal shortly before the attack. That knowledge played a role in the slow response and created the initial confusion in Benghazi.”

    U.S. rendered no aid to Stevens despite President’s “render all aid” order

    While there was no shortage of second-guessing in the White House Situation Room, military leaders in charge of quick response teams a half-a-world away sprang into action upon receipt of the consulate’s 911 call and readied the troops for a real-world rescue.

    “As the events were unfolding, the Pentagon began to move special operations forces from Europe to Sigonella Naval Air Station in Sicily. U.S. aircraft routinely fly in and out of Sigonella and there are also fighter jets based in Aviano, Italy. But while the U.S. military was at a heightened state of alert because of 9/11, there were no American forces poised and ready to move immediately into Benghazi when the attack began,” the Military Timesreported.

    It’s also been reported that on the fateful day in Libya, CIA/SEALs had a laser target trained on the enemy firing mortar rounds at the compound. The Pentagon has listed numerous explanations as to why the trained SEALs would use the lasers. However, they conveniently omitted the key component—the expectation that U.S. help was seconds away. The “fog of spin” from the Obama administration, no matter how creative, cannot conceal the truth. If fighter aircraft were dispatched to assist Ambassador Chris Stevens and other consulate personnel, a former Naval pilot says, “The paper trail would be a mile long. Not only do the pilots have to file logbook reports, but the ground crew, the crew arming the jets with appropriate weapons and the Italian air controllers would have exhaustive records.”

    The President told a KUSA Denver reporter that the minute he found out about the Benghazi attack he directed all available diplomatic and military resources to secure American consular personnel.

    Unfortunately for the CIA/SEALs fighting off the Ansar al-Shariah terrorists, the jets would never arrive. The fact, CIA/SEALs were painting their lasers on the enemy targets shortly after midnight, five hours before their eventual deaths, indicates they were expecting air support. And why would they be waiting for air support? Because the trained SEALs knew the oplans (operations plans) and military protocol for this exact operation once they requested the assistance.

    U.S. did not undertake an immediate FBI investigation as in USS Cole attack

    “There is clear precedence for conducting an investigation into this type of terrorist attack – we faced similar circumstance with the terrorist attack on the USS Cole in October of 2000 in Aden, Yemen,” Shaffer described. “We had to work rapidly to put a qualified team on the ground to investigate one of the most severe acts of terror in the pre-9/11 era. Many of the perpetrators of this attack were eventually killed, captured or eliminated via Predator drone strikes… but in the case of the Benghazi attack there HAS NOT been a rapid or expansive effort made by this White House to establish a clear path forward and begin the hard work of bringing justice to those who died and those who attacked and looted the weapons from the CIA annex -weapons that include Surface to Air missiles that can be used to down civilian airliners.”

    The FBI’s own press information concerning the response to the USS Cole bombing in 2000 highlights some key differences between the Benghazi incident and Yemen.

    “We quickly sent to Yemen more than 100 agents from our Counterterrorism Division, the FBI Laboratory, and various field offices. Director Louis Freeh arrived soon after to assess the situation and to meet with the President of Yemen. On November 29, a guidance document was signed between the U.S. State Department and the Yemeni government setting protocols for questioning witnesses and suspects. FBI and Yemeni investigators proceeded with interviews, and a large amount of physical evidence was shipped back to the FBI Laboratory for examination.”

    So what is the difference between the attack in Yemen against the USS Cole and the terror attack in Benghazi? Shaffer says, “CIA.”

    “The CIA and State Department worked to keep FBI out of Benghazi because they knew as soon as the FBI showed up, an aggressive investigation would reveal the details of the CIA mistakes and wrongdoings.”

    Was Ambassador Stevens still a CIA agent?

    Speculation is nothing new inside the beltway, but several questions surround Ambassador Chris Stevens real/past employer. If he were working as a CIA agent he would be in violation of international diplomatic protocols by running an arms trafficking program under diplomatic cover.

    Judge Napolitano offered this scenario to the Washington Times. “Now we can connect some dots. If Stevens was a CIA agent, he was in violation of international law by acting as the U.S. ambassador. And if he and his colleagues were intelligence officials, they are not typically protected by Marines, because they ought to have been able to take care of themselves.”

    Further ties to the intelligence world comes from a 2010 leaked Wikileaks classified cable that highlights the topics Mr. Stevens would be discussing to assist Libyans full reintegration to the international community.

    The main issues include; Internal political issues, bilateral relations, human rights, counter-terrorism cooperation, Sub-Saharan Africa, regional issues including Iraq and Iran, and energy sector and commercial opportunities.

    In the classified cable Stevens describes Libya as a “strong partner in the war against terrorism and cooperation in liaison channels is excellent…Worried that fighters returning from Afghanistan and Iraq could destabilize the regime, the GOL has aggressively pursued operations to disrupt foreign fighter flows, including more stringent monitoring of air/land ports of entry, an blunt the ideological appeal of radical Islam.”

    However, since this explanation lends itself to possible criminal actions requiring jail time, and since the CIA doesn’t post a roster of their agents, American’s will undoubtedly remain in the dark.

    Congressional hearings have produced no info on the Benghazi attack

    Compelling evidence names the Benghazi’s mission as the headquarters for another U.S. arms trafficking business deal gone wrong. The mission is also the scene where U.S. Ambassador Chris Stevens, two former SEALs and one State Department Information Officer were murdered.

    Keeping that statement in mind, the Benghazi disaster takes a new angle, one that could have derailed President Obama’s reelection.

    Normally international gun trafficking is a punishable crime, but sadly, not only is Benghazi, Libya another U.S. sanctioned-weapons buyback program paying jihadist large sums of money to turn in their stolen arsenal, but it appears that Ambassador Stevens acted as a point man to move those newly-repurchased weapons into the hands of Syrian rebels, many of whom are affiliated with al-Qaeda.

    This made for Hollywood movie script includes all the action, violence and drama required for today’s bloodthirsty audience—except it is real. The State Department provided the Benghazi mission with the diplomatic cover, or the comprehensive alibi, required for the Central Intelligence Agency to operate covertly in the jihadi-rich North African region.

    If this is true, one could conclude that the attack on the Benghazi mission was a counterinsurgency operation launched by terrorists that opposed another American-installed government in the Middle East.

    Conclusion

    Other than closed-door hearing leaks from members of Congress, American citizens are still no closer to learning what exactly happened in Benghazi. Nor are they privy to “why” the terrorist organization that worked with the U.S., specifically Ambassador Stevens, would turn their weapons on the mission.

    Perhaps Secretary of State Hillary Clinton will provide more details when she testifies before the House and Senate later this month. However most politicos agree she will provide more “fog of spin” the Obama administration is standing by.

    The only new update is the arrest of a suspected terrorist this weekend in Egypt.

    Most major media outlets reported that Egyptians detained Muhammad Jamal Abu Ahmad, a former Egyptian jihad member that was released from prison in 2011. It’s alleged that he is the leader of Jamal network that operates terror-training camps in Egypt and Libya and who wanted to set up al-Qaeda inside Egypt. But like everything connected to Benghazi, U.S. officials haven’t been cleared to interrogate convicted terrorist who may be responsible for the death of four Americans.

    For more Libya stories: http://www.examiner.com/article/barack-you-re-no-ronald-reagan-and-benghazi-is-proof

    http://www.washingtonguardian.com/benghazi-predictable

    For more stories: http://www.examiner.com/homeland-security-in-national/kimberly-dvorak

    © Copyright 2012 Kimberly Dvorak All Rights Reserved.

     

    April 1, 2013 – Decrypted Matrix Radio: April Fools Jokers, New No-Flys, CIA Trains Underwear Bomber, Standoff Firestarters, Cyprus Looting, Jim Carrey Gun Hater

    April 1, 2013 – Decrypted Matrix Radio: April Fools Jokers, New No-Flys, CIA Trains Underwear Bomber, Standoff Firestarters, Cyprus Looting, Jim Carrey Gun Hater

    April Fools’ Day Joke? Feds Seize 3-D Printed

    Obama’s ‘No Fly’ List for FedEx and UPS

    Secrets to Knowing & Understanding Your Higher Self

    Tracing the CIA Underwear Bomb Leak Back to the White House

    Claim: ‘US Army veteran fighting Syrian government worked for CIA’

    Cops Burn Down Another House During Standoff

    U.S. F-22 stealth jets join South Korea drills amid sabre-rattling

    Mega-Rich Withdrew Money From Cyprus Before Looting ‘Haircut’

    Jim Carrey Only Believes in first amendment for himself

    4-1

    Every Week Night 12-1am EST (9-10pm PST)

    – Click Image to Listen LIVE –