Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI

Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI

 

Anonymous has a way of releasing massive collections of information that raise many more questions than they answer.

Case in point: On Monday night, the segment of the hacker group that calls itself Antisec announced that it had dumped 1,000,001 unique device identifier numbers or UDIDs for Apple devices–the fingerprints that Apple, apps and ad networks use to identify the iPhone and iPads of individual users–that it claims to have stolen from the FBI. In a long statement posted with links to the data on the upload site Pastebin, the hackers said they had taken the Apple data from a much larger database of more than 12 million users’ personal information stored on an FBI computer.

While there’s no easy way to confirm the authenticity or the source of the released data, I downloaded the encrypted file and decrypted it, and it does seem to be an enormous list of 40-character strings made up of numbers and the letters A through F, just like Apple UDIDs. Each string is accompanied by a longer collection of characters that Anonymous says is an Apple Push Notification token and what appears to be a username and an indication as to whether the UDID is attached to an iPad, iPhone or iPod touch.

In their message, posted initially in the Anonymous twitter feed AnonymousIRC, the hackers say they used a vulnerability in Java to access the data on an FBI Dell laptop in March of this year. They say the database included not only the UDIDs, but also “user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc.” Anonymous claims that the amount of data about each users was highly variable, and that it only released enough data to the public “to help a significant amount of users to look if their device are listed there or not.”

The Antisec statement also took the opportunity to mock the recent appearance of NSA Director and General Keith Alexander at the hacker conference Defcon, where he made a recruiting pitch to attendees. “It was an amusing hypocritical attempt made by the system to flatter hackers into becoming tools for the state,” Anonymous’ statement reads. “We decided we’d help out Internet security by auditing FBI first.”

If the UDIDs are determined to be real, just what that means about law enforcement and Apple users’ privacy isn’t entirely clear. Much more than passwords or even email addresses, UDIDs are already spread around the Internet by app developers and advertisers–a study by one privacy researcher in 2011 found that 74% of the apps he tested sent a user’s UDID to a remote server. But the same researcher also found that five out of seven social gaming networks he tested allowed users to log in with only their UDID, making a stolen UDID equivalent to a stolen password.

“We never liked the concept of UDIDs since the beginning indeed,” reads the Anonymous statement. “Really bad decision from Apple. Fishy thingie.”

Due perhaps to the privacy concerns around UDIDs’ proliferation, Apple stopped allowing new iOS apps to track UDIDs earlier this year.

Regardless, if the FBI has in fact collected 12 million Apple UDIDs–or even just one million–it will have some explaining to do to privacy advocates. In its release, Anonymous argues that the massive dump of users’ personal information, which it says has been stripped of many of the most identifying details, is designed raise awareness of the FBI’s alleged gadget-tracking shenanigans. “…We will probably see their damage control teams going hard lobbying media with bullshits to discredit this,” the statement reads at one point. “But well, whatever, at least we tried and eventually, looking at the massive number of devices concerned, someone should care about it.”

For now, Anonymous refuses to answer more questions about its release–at least from the press. Before granting any interviews, it’s demanding that Gawker writer Adrian Chen, who has been especially critical of Anonymous, appears on Gawker’s home page in a “huge picture of him dressing a ballet tutu and shoe on the head.”

SOURCE: Forbes.com

Pentagon Employee Says Plane Did Not Crash into Building

Pentagon Employee Says Plane Did Not Crash into Building

http://youtu.be/qXC1aTZhxhM

Personal Interview with FBI / Pentagon Employee who Says no Plane hit the building that day, from her professional experience and lack of on site evidence of any plane or wreckage. No jet fuel anywhere, or smell of jet fuel.  No one else on site had seen any crash evidence or plane wreckage.  Believes government fabricated ‘official’ story.

 

 

 

 

Protect Yourself from FBI Manipulation (w/attorney Harvey Silverglate)

Protect Yourself from FBI Manipulation (w/attorney Harvey Silverglate)

Learn how the FBI can manipulate what you say and use it against you, and how to prevent them from doing so! With civil liberties and civil rights attorney Harvey Silverglate.

Remember: if the FBI asks to speak with you, you do not have to talk to them, no matter what they say. The best thing you can do is take the agent’s card and say your lawyer will contact them. Say nothing else, because lying to a federal agent can get you in very serious trouble, and they’ll figure out a way to make it look like you lied. Watch the clip to see how that works. Don’t get caught in their vice; don’t speak to them without your lawyer present. Ever.

When an Agent Knocks, Talk About It

When an Agent Knocks, Talk About It

Often, when folks find themselves having been visited or otherwise solicited for information by law enforcement, their reaction is to keep the fact that they’ve been targeted for government harassment quiet. In reality, however, the worst thing (next to cooperating!) that you can do in this situation is to keep it to yourself. In doing so, you deprive yourself of community support at a time that may be stressful and even terrifying and, simultaneously, you help the government maintain a veil of secrecy around the harassment and surveillance they use to destroy resistance movements.

Many people who’ve been harassed by law enforcement officers report having been threatened with negative consequences should they choose to go public about the incident. This, like so much of what they’ll tell you, is utter and complete bullshit. YOU ARE NOT LEGALLY BOUND TO KEEP THEIR SECRETS, and the fact that they often lie and try to convince you that you are only speaks to the fact that doing so benefits them, while spreading the word benefits us. Part of their strategy for repressing dissent is to quietly isolate individuals from their communities and terrorize them into cooperating in their efforts. If we expose what they’re doing every time they do it, we strip them of the freedom and protection that secrecy offers- think of it as a little counter-counter-insurgency tactic.

Publicizing government harassment is a protective measure. As we build a culture where people talk about and prepare for government repression, and support those facing it, we reduce the number of people who will turn on their comrades to save their own asses. If you come from a community where everyone is informed about incidents of harassment and knows how to deal with them calmly and effectively, and where not cooperating is the norm, you’ll be better equipped to deal with more serious situations as they arise. Whether or not you ever have been or ever will be involved in illegal activity, it’s possible that you, or someone you care about, or someone they care about, will at some point find themselves sitting in a jail cell being given the option of cooperating in exchange for some sort of leniency in charges or sentencing. And even if you don’t support ELF actions or other things that people are being indicted for these days, the old adage holds true with law enforcement: “give ’em an inch, and they’ll take down every poor fucker they can get their hands on.” That is, acquiescing to law enforcement demands that we remain silent about the things they do is just like giving a mouse a vegan cookie- who wants just one vegan cookie, after all?

Lastly, letting your community know that you’ve been visited is important because law enforcement visits are dangerous for everyone, not just the particular person who’s been visited, and you owe your community any information that may keep them safer. You don’t and can’t necessarily know exactly who may be endangered by government activity, but you can be sure that making it possible for those people it may affect to find out about it will help them. When you get visited, you may not have any idea why they’re asking what they’re asking- this could be because they’re wacked out creepers who don’t know what they’re talking about, or it could be that their asking about things that you had no involvement in. It’s not uncommon for visits to be made in a desperate attempt to find any in into radical circles that may, eventually, lead to a suspect. Thus, it’s important to be cautious about acting rashly and publicizing details (e.g., names mentioned, actions, etc.) of a visit in a way that will only incite open and potentially incriminating speculation in your community, and to balance that against the need to get as much information as possible out into the public realm so that people who it may affect can take appropriate actions to protect themselves. So, while there’s no doubt that you should go public immediately with your experience of government harassment, you should also take the time to consult with trusted friends and support networks to determine the best way to do so and still avoid unwittingly getting others in trouble.

http://midwestgreenscare.files.wordpress.com/2008/06/mgs-zine-30.pdf

FBI Wants To Make It Easier For You To Tell Your Customers They Might Be Felonious Pirates

FBI Wants To Make It Easier For You To Tell Your Customers They Might Be Felonious Pirates

The following may look familiar to you:

It’s the FBI’s special “anti-piracy” warning. For the past few years, under a special “pilot” program, the FBI has allowed the RIAA, MPAA, BSA, ESA and SIIA (basically, the big record labels, movie studios, video game makers and software companies) to make use of the logo to warn all of their customers that they just might be felons and the FBI might show up at any moment. It’s pure FUD. It also makes no difference. Is there seriously anyone anywhere in the world who sees this logo and suddenly changes their behavior?

However, this program is about to expand in a big, big way. The FBI is about to release new rules (pdf and embedded below) that expand the program so that any copyright holder will be allowed to slap this logo on their product. Expect to start seeing it everywhere… and to feel that much more like the content creator you’re legitimately buying from thinks you’re a crook subject to federal law enforcement action. Way to “connect” with fans, huh?

The document from the FBI discussing this repeats a few times that the FBI really feels like this program is effective and important. Could they be any more out of touch?

First, the FBI believes that the APW Seal and accompanying warnings convey important messages to the public and are a significant component of its efforts to deter and to investigate federal crimes involving the piracy of intellectual property. Allowing use by copyright holders who are not members of industry associations will enhance those efforts. Second, although broader access may make unauthorized use more likely, this concern is overshadowed by the value of increasing public awareness of these prohibitions and the FBI’s role in investigating related criminal activity.

There are all sorts of issues with this. The first is that this whole campaign is ignoring a key point: nearly all copyright infringement is a civil infraction, not a criminal one. Most ordinary users don’t understand the difference between civil and criminal infringement — and the FBI and its silly seal do nothing to explain that difference. It’s pretty clear that the purpose is to falsely imply that sharing with a friend music you legally purchased might somehow lead you to being targeted in an FBI sting operation. It’s FUD, plain and simple. Second, the idea that spreading this logo further will deter actual criminal infringement? Are they serious? Remember, one of the requirements for criminal copyright infringement is that the action is willful. That means that the person knows they’re breaking the law. So educating them on the fact that they’re breaking the law… er… shouldn’t make much of a difference.

Finally, notice that nowhere does the FBI provide any data on how effective this program has been. Because there isn’t any. The MPAA shows this logo before movies, and it’s not like there has been any less infringement. In fact, the FBI and ICE recently decided to double up and extend the warnings on DVDs , and it’s not like that made a difference either. No, instead, all it’s done is piss off tons of legitimate customers, who paid good money for the content, only to be interrupted by a giant FBI logo warning them that they may be criminals facing federal charges. The FBI even admits: “it is difficult to measure the effectiveness of the APW Seal program at preventing piracy,” but apparently that won’t stop it from expanding it. Who in their right mind thinks this is a sensible strategy?

Either way, it’s interesting to read through the comments and feedback on this program — including someone who suggested that the FBI should make sure the warning is skippable at the beginning of movies (the FBI notes that’s up to the film producers) or another one that says this seal should be mandatory on copyright-protected works (the FBI rightly points out it has no such authority). Repeatedly, when people raise issues of more widespread use of the seal (dilution, confusion, belief that works without the seal aren’t protected, etc.) the FBI insists that the supposed benefits of blanketing the universe with this logo far outweigh any downsides.

There were also concerns raised that the logo will have serious chilling effects on fair use — which is definitely a major possibility. And the FBI’s response is ridiculous.

Five comments also expressed a concern that the broader accessibility of the APW Seal may have a “chilling effect” on fair use, as some copyright holders may attempt to use the APW Seal to discourage uses of their copyrighted work that would otherwise be permissible under the fair use doctrine. The FBI fully recognizes that fair use, which is authorized under Title 17, United States Code, Section 107, does not constitute infringement, much less a federal crime. The warning language does not suggest otherwise. The FBI intends to address this matter on its public website.

Because we all know that everyone who sees the logo will go to the FBI’s website and read the fine print at the bottom of the page.

Of course, what’s really crazy in all of this is that the FBI is famous for having an itchy trigger finger when anyone uses its normal logo. Remember, this is the same FBI that, just two years ago, sent a threat letter to Wikipedia, because the Wikipedia page on the FBI shows the FBI logo (leading to an awesome reply from Wikimedia General Counsel, Mike Godwin).

Honestly, the whole thing is silly, but because of this kind of cluelessness, expect to see those pointless FBI warning logos on all sorts of content in the future, so that every time you legitimately purchase content, you’ll be reminded that the copyright holder thinks you’re a lousy stinking thief who deserves a federal investigation. I’m still trying to figure out how that could possibly be good for business, but I guess I just don’t understand copyright…

SOURCE: TechDirt

NZ Judge: Raid on Megaupload’s Kim Dotcom Illegal, Search Warrants Unlawful

NZ Judge: Raid on Megaupload’s Kim Dotcom Illegal, Search Warrants Unlawful

Published: 28 June, 2012, 10:15

The High Court of New Zealand has ruled that the police raid on Kim Dotcom’s mansion was unlawful along with seizure of the hard drives that were later cloned and illegally taken from New Zealand to the US by the FBI.

­The warrants issued to search Dotcom’s mansion were general and did not clearly describe the offences they stipulated, ruled Justice Helen Winkelmann.

“They were general warrants, and as such, are invalid,” she explained.

The New Zealand police force is currently holding talks with the Crown Law on the next course of action and has refrained from commenting on the judgment.

The ruling released on Thursday by Justice Helen Winkelmann insists the warrants were too vague concerning the scope of the search and the items authorized to be seized by police.

SOURCE: RT.com

JFK Assassination Linked to Bush Crime Family

JFK Assassination Linked to Bush Crime Family

Short Version: For those too busy to follow this all the way through….  George HW Bush is ultimately responsible for the planning & execution of JFK, as sanctioned by his masters – The Federal Reserve families.  This explains his subsequent rise in power, from novice CIA spook, to CIA Director, Presidential Cabinet, Vice President, President…. to 33 Degree Iluminati Freemason..? Details to prove this conclusively are best conveyed by John Hankey. The connections back to GW Bush are absolutely astounding, and numerous enough for one to lose count.      -DCMX

ABOUT THIS DOCUMENTARY

Relying exclusively on government documents, statements from the best witnesses available, and the words from the mouths of the killers themselves, Dark Legacy produces a thoroughly substantiated criminal indictment of George Herbert Walker Bush, establishing beyond a reasonable doubt his guilt as a CIA supervisor in the conspiracy to assassinate John F. Kennedy. If we could present this evidence to a jury in Texas, he would pay with his life.

Part one presents the overwhelming mountain of evidence that President Kennedy was hit by bullets from the front and rear. Every witness in the Dallas emergency room attests, on camera, to the fact that a bullet from the right front blew a fist-sized whole in the back of the President’s head. The New York Times carried these statements on the day of the murder; and has covered them up ever since.

*************

Part two presents the on-camera testimony of the witnesses who actually handled the President’s body, the FBI report, and the photographic evidence all proving unequivocally that the President’s body was stolen from the Secret Service and the wounds altered, before the body was delivered to Bethesda Naval hospital for the autopsy. Jackie Kennedy accompanied an empty casket on the plane flight home. Who had the power to do all this without attracting public attention? It’s a short list.

************

Part three presents the Nazi-connections of the Bush family, which prompted the FBI to seize their assets during WW II, as Nazi assets. It presents the suppressed fact that Watergate burglar and CIA operative E. Howard Hunt was found by a jury to have been in Dallas and involved in the conspiracy to kill Kennedy. Hunt was a supervisor of the misguided CIA-led anti-Castro Cubans who broke into the Watergate. He is not only connected to Bush through Watergate; and through Bush’s father, Prescott; but five days after the assassination, the head of the FBI, J. Edgar Hoover, wrote a memo, titled “Assassination of President John Fitzgerald Kennedy” in which he named “George Bush of the Central Intelligence Agency” as the supervisor of what Hoover himself called the “misguided anti-Castro Cuban” killers of the President. Bush has said he doesn’t remember the events of that day, but FBI documents place him in Dallas.

 

It is difficult to assess the stature and significance of someone who has been dead as long as John Kennedy. His killers have also been his detractors, actively desecrating his memory, as they did his body. The movie begins with a short presentation of some of his most powerful and important speeches; including a stunning speech to the UN in which Kennedy calls for the complete abolition of the military industrial complex. These same men the military industrial complex, ripped him from us, and the darkest features of our history since that time are all directly the result of his murder.

 

 

*******  JFK ASSASSINATION EXPLAINED *******

I don’t think we are much encouraged to see History as science. Quite the opposite, actually. And of course, that’s all politics. The winners write history, and the truth be damned. Even science can have trouble trying to act like science when political issues are involved, as we see with evolution, tobacco-and-cancer, and global warming. But I think History does have a lot in common with physical science. For example, I can remember when “Continental Drift”, the idea that Africa and America were once stuck together, was very much considered “just a theory”; ridiculed by some, and regarded with amusement by many, and promulgated as likely by a tiny minority. But as time goes by, the evidence accumulates; and the meaning of old evidence begins to settle in; and ideas that were once considered outrageous gradually get worn in and start to be regarded as obvious common sense. Part of this process is the continual accumulation of new evidence. New pieces are added to the puzzle and the picture becomes more clear. And sometimes the hidden meaning of old evidence, that has been lying around for years, suddenly jumps out. Evidence of the fossils and minerals that can be found on the east coast of Africa, and on the west coast of Brazil, may have been lying around for years, before someone decided to look and see if they matched, and found that they did; and proved conclusively that west Africa and Brazil were once attached.

With regard to George HW Bush and the murder of John Kennedy, Joseph McBride found this memo in 1988.

FBI director J. Edgar Hoover wrote this memo 5 days after the assassination, naming George Bush as a CIA officer.

The last, and most crucial paragraph, is very hard to read. The following is a transcription:

“The substance of the forgoing information was orally furnished to Mr. George Bush of the Central Intelligence Agency and Captain William Edwards of the Defense Intelligence Agency on November 23, 1963, by Mr. V.T. Forsyth of this Bureau.”

When it was first released in 1978, George Bush was an obscure bureaucrat, a virtual unknown. So when the best researchers on the planet saw this memo in 1978, they didn’t pay much attention to it. When Bush became vice president two years later, no one was able to connect his now well-known name to this obscure memo. But when Joseph McBride was messing around in 1988, Bush was running for president; and when McBride saw the memo, he jumped up and shouted “Hey, this memo is about Bush! It says he was in the CIA, way back in 1963!”

And for the longest time, the focus was on this simple isolated fact: that Hoover said Bush was in the CIA in ’63. Bush said the memo must be referring to another “George Bush,” because he wasn’t in the CIA at that time. But over the years, people were able to assemble the facts from Bush’s personal life, showing his deep involvement with the CIA at that time, and with the CIA’s anti-Castro Cubans (in the memo, Hoover calls them “misguided anti-Castro Cubans”). And over time, it has become undeniable; that Hoover was referring, in his memo, to none other than George Herbert Walker Bush. And for a while, that was it. End of story.

But the title of this Hoover memo is, “Assassination of President John Fitzgerald Kennedy”. Isn’t that important? Well, you’d think so. But for the longest time, no one made much out it. Besides, Hoover scarcely mentions the assassination in the memo, instead focusing on these “misguided anti-Castro Cubans.” The body of the memo does not appear, at first, to be in any way related to the title of the memo “the assassination of President John F Kennedy”. But then Mark Lane, in his book Rush to Judgment, did the fabulous work of demonstrating, and in fact persuading a jury, that E. Howard Hunt, a major lieutenant in the CIA’s “misguided anti-Castro Cuban” program, was in Dallas and involved in the assassination. With this background, with this framework to guide the researcher, it was then possible to assemble the considerable evidence linking Bush to Hunt.

People might have taken some notice before that Bush made the unusual request, as Nixon’s ambassador to the UN, to be given an office in the White House. They may have noticed that Hunt, although he was not being paid by anyone in the White House, or answering to anyone that we know of in the White House, also had a White House office. But with the Hoover memo in hand, establishing Bush as a supervisor of the CIA’s “misguided anti-Castro Cuban” operation, it is possible to connect Bush to Hunt at the Bay of Pigs. With this memo in hand, it is possible to connect Bush and Hunt as two CIA operatives with offices inside the White House. With this memo in hand, it is possible to answer who it was that Hunt answered to inside the White House; and how he got the office in the first place. And with all that, it is possible to connect Bush to Hunt, and therefore to Dallas, to Hunt in Dallas, and to the “misguided anti-Castro Cuban” assassins of John Kennedy. Which is what Hoover did for us when he wrote the title of the memo. Little by little, the pieces start to fall into place. And pieces that in isolation meant nothing, become key parts of a whole picture.

But even so, this is not a rock-solid connection: Hunt was directly involved in the murder of JFK. And Bush supervised Hunt. But Bush probably supervised a lot of CIA people, not all of whom were directly involved in the assassination. A high-ranking officer may be connected to all of the acts of all of his troops, by reason of his being their commander. But it’s not a direct connection. It doesn’t establish that the officer knew about, or approved of, or was involved in, all the actions of those troops.

Enter FBI memo # 2:

It will come up again in a minute, so please read the first line carefully. Bush identifies himself to the FBI as an independent oil man from Houston.

This memo establishes that sort of direct connection between Bush and Hunt, in Dallas, on the day of the assassination. This memo records Bush’s phone call to the FBI, precisely an hour and fifteen minutes after the assassination. When I first encountered this memo, and when I first put it into my movie, JFK II, I simply called it “weird”. I saw it only in isolation, a weird, isolated connection between Bush and the assassination. It took me years to see it in context. That is, to see that this phone call demonstrates, clearly, that George Bush, was on duty that day.

He was staying at the Dallas Sheraton because his duty assignment was in Dallas. His phone call to the FBI cannot have been random. This James Parrott worked for Bush as a sign-painter; he was not an assassin; this phone call is not what it purports to be; Bush was fulfilling some obscure under-cover function in making this call. So the phone call has to be seen as part of his CIA assignment; which was clearly connected to the assassination. This memo then establishes that Bush was in the Dallas area, and on duty; and that his duty assignment was connected to the assassination. And if his men were in Dallas shooting the President, as they were, he was certainly on duty supervising them. If he were not supposed to be supervising them, his bosses would have assigned him to be at his home office in Houston, Texas; or on his oil rigs in the Caribbean.

But, even in context, this memo and the phone call it describes is still weird, no? I mean, how could Bush have been so stupid as to make this insanely incriminating phone call? Without this FBI memo, recording this phone call, we don’t know, or even have a good clue as to where Bush was, or what he was doing the day of the assassination. Do we? Bush has, until recently, simply said that he did not remember what he was doing the day of the assassination. But with this memo, Bush tells us where he was and what he was doing — he hands us his head on a silver platter. What could possibly have motivated him to make such a stupid error as making this phone call to the FBI? It’s a valid question. It’s not an essential question. We can still value this memo, and extract a great deal of important content from it without answering the question of why, but the question remains.

And we can make a stab at answering it. Russ Baker in his fine book, Family of Secrets suggests that Bush was attempting to establish an alibi. Now, by making this phone call, he, in fact, establishes that he was in the Dallas area, and that he was on duty, related to the assassination. So if he’s trying to establish an alibi to cover-up where he actually was and what he was actually doing, what he is trying to cover up must be some pretty bad stuff, some pretty incriminating stuff, if it’s worse than what he gives us with this alibi.

And what could be worse than what he gives us? Well, obviously, he must have actually been in Dallas. In fact, I think, this situation suggests he must have actually been in Dealey Plaza. I mean seriously. Think about it. He’s so panicked about the truth coming out, that he puts his head in a noose and hands it to us. It makes me think he must have been in Dealey Plaza, he must have been in the company of the shooters, and he must have felt that there would be evidence to prove that.

We’re just speculating at the moment. We’ll get to the evidence right now, but I’m trying to set the scene. If a guilty party is in a panic, trying to cover evidence connecting them to a crime, they may invent an explanation, or an alibi, that seems like a good idea at the time; but that in fact constitutes a very damaging admission. Anyway, stew on that while you consider this photo:

You see this tall thin man in a suit, with a receding hair line. Many people claim this is Bush, standing in front of the Texas School Book Depository. And it might be. It might be a lot of people. And perhaps, when he called the FBI and incriminated himself, Bush was concerned that he might show up in a better picture than this, where he was positively recognizable, looking towards the camera.

Personally, I don’t think this photo looks much like Bush; and in fact, I didn’t think he’d be stupid enough to just be hanging around the murder scene. I thought he was sufficiently high ranking that he’d leave such on-scene stuff to his underlings. Right? At least in my mind, if you’re an officer like Bush, you’re the coach. You plan, you train and prepare your people, and then you stand back and watch it happen. Or so I thought. Fletcher Prouty was certain that he saw pictures of Ed Lansdale, a military operative of the highest rank, signaling to the “tramps” arrested behind the grassy knoll to “be cool,” that everything was alright. Hunt was a high-ranking CIA officer, chief of the CIA’s Mexico station; and his son says he is one of the “tramps” who show up in several photos of men who were arrested behind the grassy knoll. So, some of the highest ranking members of the killers’ operation were apparently there, on the front line, to make sure that when things went wrong, as they inevitably do, these high ranking officers could be there to fix whatever the problem was. So, given that high- and low- ranking CIA officers were present, this photo of this thin man in a suit might, indeed, be Bush. It’s possible.

And now, look at this picture of the Dal-Tex building. The Dal-Tex building is across the street from the Book Depository, and many leading researchers into the assassination, including Jim Garrison, say there was certainly a team of shooters in this building:


[click for larger]

And as you can see, some imaginative individual has added some color to indicate three men in this window. Very creative, very imaginative; and at least plausible. Still, it takes way too much imagination and effort, to see Bush’s face. But now observe this link: http://www.ratical.com/ratville/JFK/WTKaP.html

 

Actually, You don’t have to stop and read it, because I’ll quote the relevant part. It’s a statement from Roger Craig, winner of the deputy of the year award for Dallas in 1960, and one of the most honest men working that day in Dallas. He’s an amazing and heroic fellow, worthy of all the time you could take looking into his background and character. And here, in the following passage, he is describing a conversation he had with Jim Garrison, and he says,

 

“Jim also asked me about the arrests made in Dealey Plaza that day. I told him I knew of twelve arrests, one in particular made by R. E. Vaughn of the Dallas Police Department. The man Vaughn arrested was coming from the Dal-Tex Building across from the Texas School Book Depository. The only thing which Vaughn knew about him was that he was an independent oil operator from Houston, Texas. The prisoner was taken from Vaughn by Dallas Police detectives and that was the last that he saw or heard of the suspect.” (emphasis added)

 

Holy Moe Lee! Please notice that, in speaking to Jim Garrison, Craig says “in particular”. Apparently he and Vaughn thought this was the most significant arrest made that day; pretty amazing given that E.Howard Hunt was arrested in the rail yard behind the grassy knoll. And the only thing Craig knew about this “particular” arrestee was that he had exactly the same singular CIA-cover, “an independent oil operator from Houston, Texas”, that George Bush had used that same day in his contact with the FBI.

 

Now. There are a very limited number of possible explanations for who this “independent oil operator” was. Let’s look at them.

 

It is conceivable that the CIA had two men in Dallas area that day, supervising the shooters, who both had the designated cover of being an “independent oil operator from Houston.” Bush was one, as the evidence above clearly shows; and perhaps there was another who was with the shooters in the Dal-Tex building, supervising them directly. But unless the CIA overlords were trying to set Bush up, they would not have told anyone else to use Bush’s CIA cover to identify themselves to the police. If another man was involved in the crime, and was arrested for it, and he told the cops he was an “independent oil operator from Houston,” this would tend to throw suspicion in Bush’s direction. Bush’s association with the CIA’s Cubans was already widely known. Fletcher Prouty knew and wrote of it. Fabian Escalante, the head of Cuban counter intelligence, knew and has written about it. James Files, who claims very credibly, to have been a driver for the Mafia shooters in Dallas, has spoken on-camera about it. And FBI director J. Edgar Hoover, knew about it and wrote about it in his memo. So Bush was already a suspect in Hoover’s eyes. The CIA planners, then, would not have told anyone else, “in case you get arrested, tell the cops you’re an independent oil man from Houston”. Right? They would not have done this, since it would tend to incriminate Bush, who was already in a highly visible, highly suspicious position.

 

Another unlikely possibility is that this “independent oil operator from Houston” was just some innocent oil operator, who somehow managed to attract suspicion, and was arrested. Do you think it’s possible that another oil man from Houston just happened to be in that corner of Dealey Plaza? I hope you think it’s possible. Because, as unlikely as it seems, if you think it was possible, then certainly Bush would have been reasonable in thinking that, as he was being arrested, there were other independent oil operators in the crowd who witnessed his arrest. You see, Bush spoke to a group of oil men in Dallas the night before the assassination*2. If it were possible that some of them were in Dealey Plaza, he would need to be terrified of the possibility that some of them might actually have seen the arrest, and would have been able to identify him as the object of that arrest.

 

No wonder, then, that Bush freaked out, and made this stupid incriminating phone call to the FBI. Even if it showed that he was not in Houston, or in the Caribbean, but in Dallas, at least it suggested that he was not in police custody for the murder of the President, in Dealey Plaza.

 

But now stop and think a minute: why was he arrested? What was he doing that drew this cop’s attention at all? What could he possibly have been doing to make this cop think that he needed to arrest Bush? Perhaps walking out of a building without attracting attention is harder than it sounds; and it reasonable to suppose that the crowd outside the Dal-Tex building had heard the shots, had heard that the President had been wounded, and they were carefully scrutinizing anyone who came out of the building. But this story shows clearly that Bush was not the sort of cold-blooded killer who could take part in the murder of a man, and then act and look like nothing was going on as he tried to leave the scene of the crime. And it turns out that as an old man, Bush continues to suffer from this character trait, of being unable to hide feelings that need to be kept secret. As you can see in this link, http://www.youtube.com/watch?v=ft3eGWZd7LE , at Gerry Ford’s funeral, Bush suddenly breaks into a wide grin while speaking of the Kennedy assassination. This is not a Mona Lisa smile. This is face-wrenching spasm of glee.

 

In a minute we’ll take up the question of why Bush would grin at his recollection of watching John Kennedy’s brains splatter; the point for us now is that he apparently had a similarly inappropriate, show-stopping expression on his face as he attempted to exit the Dal-Tex building; he had the look of a murderer in his eye, so clearly that it could not be missed; as this funereal-grin could not be missed. And the guilt plastered all over Bush’s face drew people’s attention. And this cop, Vaughn, arrested him.

 

Now remember, Roger Craig tells this story in the context of his discussions with New Orleans District Attorney Jim Garrison about the suspects who were arrested that day and who then evaporated without leaving a mugshot, interview, fingerprint, or name. Garrison spoke not only to Roger Craig, but he no-doubt spoke to Vaughn, who made the arrest. And Garrison adds the following:

 

“At least one man arrested immediately after the shooting had come running out of the Dal-Tex Building and offered no explanation for his presence there. Local authorities hardly could avoid arresting him because of the clamor of the onlookers. He was taken to the Sheriff’s office, where he was held for questioning. However, the Sheriff’s office made no record of the questions asked this suspect, if any were asked; nor did it have a record of his name. Later two uniformed police officers escorted him out of the building to the jeers of the waiting crowd. They put him in a police car, and he was driven away. Apparently this was his farewell to Dallas, for he simply disappeared forever.”

— On the Trail of the Assassins, p. 238 —

 

This vision of the panicked Bush being arrested, no-doubt terrified as he was taken to the police station, and possibly even booked (though the record of any such booking has been destroyed) provides a context that explains a number of Bush’s otherwise-mysterious actions. Certainly Bush was freaked out and panic-stricken! An angry crowd clamored for his arrest, and jeered his release.

 

Being a newbie in these dark affairs, Bush didn’t have confidence in the ability of the old devils at CIA to make water run uphill, to make time run backwards, to silence the witnesses, to destroy the records, and make it all go away. And so he panicked; he acted on his own, stupidly; he called the FBI, thinking that he was “cleverly” providing evidence that it wasn’t him who was arrested in front of the Dal-Tex building that day. In his panic-stricken state, this seemed like a good idea. He was unable to see that he was actually creating a permanent absolutely-positive record of his involvement.

 

We can now also explain the grin. He grins ridiculously at Gerry Ford’s funeral, at the mention of John Kennedy’s murder, not because he is such a ghoul that he thinks splattering the contents of Kenney’s head all over Jackie Kennedy was funny; but because mentioning the assassination causes him to recall the comedy of errors that produced his own ridiculous panic, arrest, more panic, and so on.

 

Garrison wrote his paragraph about Bush’s arrest in 1988. Deputy Craig’s article was written in 1971 and posted in 1992. But the significance of these paragraphs was discovered last week. There hardly was an internet in 1992 when Craig’s article was posted. And for 19 years, no one noticed that this phrase, “independent oil man from Houston”, is a very unique description of Bush. No one noticed until last month, when one of the moderators of JFKMurderSolved showed it to me. And I wrote about it to some friends, and one of them suggested I read what Jim Garrison had to say.

 

So the pieces continue to fall into place. Little by little, the picture is filled in, the questions get answered. And the conclusions become more incontrovertible. This is just the sort thing that happened with the theory of Evolution and the Big Bang theory; and the theory of continental drift. And someday they may start to teach history, as a science, based on evidence, in the universities. Really! It could happen! At which point, Bush’s involvement in JFK’s murder will be taught, like evolution, as the only plausible explanation of the available reliable evidence.

 

Final note: Until recently, Bush had nothing more to say about his whereabouts the day of the assassination than that he doesn’t remember where he was. That in itself is extraordinarily incriminating. Everyone who was alive at the time remembers where they were on 9-11, and on the day Kennedy was murdered. But, saying that he doesn’t remember, however improbable, is at least consistent with Bush’s autobiography, which mentions nothing.

 

Lately, however, perhaps at least partly in response to my work, Bush and Co. have concocted a story that he was speaking in Tyler, Texas to the Rotary Club. The vice-president of the Rotary Club, Aubrey Irby, says that Bush was speaking when the bellhop came over and told him, that Kennedy was dead*1. Mr. Irby passed the information on to Mr. Wendell Cherry, who passed it on to Bush; who stopped his speech. Irby says that Bush explained that he thought a political speech, under the circumstances, was inappropriate; and then he sat down. As a would-be alibi proving Bush’s innocence, there are at least three huge problems with this story.

 

The first is that it is inconceivable that Bush would not have remembered such an event; or that he would have left it out of his autobiography, since it shows what a fine and respectful fellow he is. If he didn’t remember it sooner, or include it in his autobiography, it’s clearly because it never happened.

 

The second huge problem with this story is that it couldn’t possibly have happened; that is, it is made impossible by Bush’s original alibi, his phone call to the FBI, as you’ll see:

The witness who tells this story, Aubrey Irby, says that Bush excused himself and sat down. It doesn’t say that he rushed out of the room in a frantic search for a phone. The problem is that Walter Cronkite’s announcement to the world that Kennedy was dead came at 1:38 (http://www.youtube.com/watch?v=76gl3NZAdxo). Certainly, no one was listening to Walter Cronkite in the same room in which Bush was speaking. Therefore we can be sure that this bellhop, who told Irby that Kennedy was dead, was in another room. The bellhop had to make the decision that he had heard enough of the news to leave off listening to the news. This is no small point. Texas governor Connally was severely wounded. Lyndon Johnson was reportedly wounded. There was much other news to be confirmed. At some point, then, the bellhop decided to stop listening and go make an announcement. There’s no reason to think Irby would be the first person he would tell. But at some point he went to the room where Bush was speaking and informed Mr. Irby that the president was dead. This walk to find Irby took time, of course. Mr. Irby had to receive the information, and then he had to decide to inform Mr. Wendell Cherry, the president of the Kiwanis. Mr. Cherry had to decide that he should interrupt Bush’s speech; Mr. Cherry had to then walk over to Bush and tell him the news.

 

Bush had to decide what to say; and he had to say it. And, according to the only witness, Mr. Irby, Bush “then sat down”. Somehow, when he was finished sitting, without attracting Mr. Irby’s attention, Bush had to seek and find a phone. This would have been a hotel phone, so he would likely have had to go through the hotel switchboard to get an outside line. Do you suppose the switchboard was busy after the announcement of the President’s death? It’s a good guess. In Washington D.C. so many people rushed to make a phone call that the phone system went down. In any case, once he got through to the hotel operator and got an outside line, Bush then had to call information and get the number of the FBI. After getting through to information, and getting the number, he then had to call the FBI; and penetrate their switchboard, which was, no doubt, very busy; and he had to locate an agent, on what must have been the busiest day in the history of the Dallas bureau. How many minutes do you suppose that would take? Twenty seems a fair guess, though it seems implausible that a civilian could even get through, given all the official police business going on at the time. We know that the Dallas FBI was all over the murder scene, confiscating camera film and intimidating witnesses; so it’s hard to imagine how Bush, an hour after the shooting, was able to reach an agent at all. Given the “sitting” that Mr. Irby observed Bush doing, for all this to have transpired in 45 minutes would be tidy work. But Bush had to do all of this, as the FBI memo states, by 1:45, seven minutes after the news of Kennedy’s death first went out; which is blatantly impossible.

 

The third problem is this question of why Bush would feel that it was necessary to concoct such a story at all? Why does he have to tell us this lie? Why does he have to get others, like Irby, to lie for him? The irony is that the harder he tries to make himself appear innocent, by lying, the more evidence he gives us of his guilt.

 

*1 Kitty Kelley, The Family: the Real Story of the Bush Dynasty, p.213; cited by Russ Baker in Family of Secrets, p.54

*2

There are some people who manage to point to this and say “ahah! That’s why Bush was in Dallas! Not to kill the President, but to speak to the other oilmen!” But as the Hoover memo shows, being an oilman was just a cover for Bush’s real occupation as a CIA supervisor of trained killers. He needed an excuse for being in Dallas. This speaking engagement provided him with one.

———————-

FROM THE DIRECTOR

George Bush killed Kennedy. Or was it the Mafia? Maybe Castro did it. Who cares? It was 40 years ago. What difference does it make?

It matters.

The day he died we lost an invaluable treasure. This video documents that we lost a man of peace, who tried to cool off the cold war, and to get the American people to see their Russian enemies, not as despicable inhuman monsters, but as people like us.

On November 22, 1963, you lost the man who saved your life on October 17, 1962. At the height of the missile crisis, Kennedy’s generals and advisors were urging him to launch a first strike attack against Cuba. They assured Kennedy that the Russian missiles in Cuba were not nuclear and were not ready; but that he and they should quietly slip away to the safety of bomb shelters anyway, just to be safe; and then launch an attack, leaving the rest of us out to die. Kennedy thought about it. And then he told them that nobody was going anywhere. If anyone died, they would be the first to go, sitting as they were in the Whitehouse, the prime target of those Russian missiles. Together they then figured out a safer plan. Robert McNamara, Secretary of Defense at the time, recently learned from the Russians that the missiles were armed, were ready, were nuclear, and that their commanders were authorized to use them in case of an attack. If you live in the northern hemisphere, the lives of your parents, and your future, were certainly saved by John Kennedy on that day. It matters that his killers be exposed.

In his farewell address, President Eisenhower had warned Kennedy, and the rest of us, of the threat posed to democracy by what Eisenhower called “the military industrial complex.” And while Kennedy famously went after the CIA, and refused to commit troops to Vietnam, I always wondered why he didn’t more openly attack this military industrial complex. And then I stumbled upon a speech he gave at the United Nations. As you will see in the video, he called upon the Russians, and United Nations, to help him to take on this military industrial complex, in order to “abolish all armies and all weapons.” But he was swept away. And in the years since, millions have died in needless wars, trillions of dollars have been wasted on “defense”, and millions more people have lived and died needlessly in poverty. It matters that we lost him.

In 2007, Bruce Willis told Vanity Fair magazine, “They still haven’t caught the guy that killed Kennedy. I’ll get killed for saying this, but I’m pretty sure those guys are still in power, in some form. The entire government of the United States was co-opted.”

Now Willis probably would not mind my suggesting that he’s no genius. At best, his observation is common sense. 80% of the American people agree with him. Indeed, this video, proving that Kennedy was brought down by the most powerful men in the world and their hired thugs, is not based on secret documents. It is all information that has merely been suppressed. Oswald allegedly shot Kennedy from behind. But the day he died, the NY Times carried the story, told by the doctors in Dallas, that Kennedy had an entrance wound in his throat, another in his right temple, and a large gaping exit wound in the back of his head. After talking to the emergency room doctors, Kennedy’s press secretary described, to the assembled press, a shot to the right temple from the right front that went “right through the head.” All of the witnesses near the right front, the grassy knoll, described hearing shots from that direction, and dozens of witnesses raced up the knoll in pursuit of the shooters. These witnesses talked to the press. But all of this information has been suppressed for the last 50 years. By whom? Who could?

You will also see in this video the overwhelming best evidence, from the best witnesses, proving beyond a reasonable dispute, that Kennedy’s body was stolen from Air Force One, and the wound to his right temple was mutilated, before the autopsy. Jackie Kennedy kept watch over an empty casket on the flight from Dallas to Bethesda Naval Hospital. Then the body was quietly taken to Bethesda for the autopsy, arriving 20 minutes before Jackie and the empty casket. Who had the power to arrange this? Who HAS the power today to suppress all this evidence?, and to continue to bombard us with ridiculous lies about a lone gunman? It’s a short list, isn’t it? It doesn’t include the mafia, or the Russians, or Castro. It does include the Bush family – or rather their masters in Big Oil; the banking elite; the backbone of the military industrial complex. These men, and their successors, carried out the attacks of 9-11. It matters.

 

 

NEW DOWNLOADABLE EXTRAS!

To compliment the DVD, here are four audio extras with increased appreciation for the events described in the film:

An In-Depth Look at Oswald

LBJ Part One – Hunt’s Deathbed Confession

LBJ Part Two – Evidence of Innocence

LBJ part Three – More Evidence of Innocence

It Never Ends – More Evidence of Bush in Dallas

 

Terrorists for the FBI: Inside the Bureau’s Secret Network that Surveils and Entraps Americans

Terrorists for the FBI: Inside the Bureau’s Secret Network that Surveils and Entraps Americans

 

Profiles in Terror

Click on an image to view information about each terrorism defendant, or browse the whole database.

  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo
  • Profile Photo

WATCH VIDEO

How did a trio of cornflake thieves end up on the feds’ terrorism list?

Terrorism Cases State By State

Forty-three in Wisconsin? Three in Alaska? Click the map for details on terror cases in your state or click here for the rest of the charts.

Califonia Oregon Washington Alaska Arizona Montana Colorado Texas Oklahoma Wisconsin Iowa Tennessee South Carolina Maine Minnesota Michigan Pennsylvania Florida District of Columbia Indiana Kentucky Georgia Alabama Mississippi Arkansas Missouri Louisiana Illinois Connecticut Ohio Delaware North Carolina Virgina Massachusetts New York Maryland New Jersey

out of 508 defendants...

48% 31% 10%

 

The Serial Snitch

Six defendants, two cases, one smooth operator: A sample from our terror trial database

FBI Web of Informants

An (inadvertent) FBI Guide to Keeping Your #Bitcoin Transactions Below the Radar

An (inadvertent) FBI Guide to Keeping Your #Bitcoin Transactions Below the Radar

>>> FBI BITCOIN REPORT – APRIL 2012 <<<<

The FBI sees the anonymous Bitcoin payment network as an alarming haven for money laundering and other criminal activity — including as a tool for hackers to rip off fellow Bitcoin users.

That’s according to a new FBI internal report that leaked to the internet this week, which expresses concern about the difficulty of tracking the identify of anonymous Bitcoin users, while also unintentionally providing tips for Bitcoin users to remain more anonymous.

The report titled “Bitcoin Virtual Currency: Unique Features Present Distinct Challenges for Deterring Illicit Activity,” (.pdf) was published April 24 and is marked For Official Use Only (not actually classified), but was leaked to the internet on Wednesday.

In the document, the FBI notes that because Bitcoin combines cryptography and a peer-to-peer architecture to avoid a central authority, contrary to how digital currencies such as eGold and WebMoney operated, law enforcement agencies have more difficulty identifying suspicious users and obtaining transaction records.

Though the Bureau expresses confidence that authorities can still snag some suspects who use third-party Bitcoin services that require customers to submit valid identification or banking information in order to convert their bitcoins into real-world currencies, it notes that using offshore services that don’t require valid IDs can thwart tracking by law enforcement.

Bitcoin is an online currency that allows buyers and sellers to exchange money anonymously. To “cash out,” the recipient has to convert the digital cash into U.S. dollars, British pounds or another established currency. Bitcoin is used as a legitimate form of payment by numerous online retailers selling traditional consumer goods, such as clothing and music. But it’s also used by underground sites, such as Silk Road, for the sale of illegal narcotics.

To generate bitcoins, users have to download and install a free Bitcoin software client to their computers. The software generates Bitcoin addresses or accounts — a unique 36-character string of numbers and letters — to receive Bitcoin payments. The currency is stored on the user’s computer in a virtual “wallet.” Users can create as many addresses or accounts that they want.

To send bitcoins, the sender enters the recipient’s address as well as the number of bitcoins she wants to transfer to the address. The sender’s computer digitally signs the transaction and sends the information to the peer-to-peer Bitcoin network, which validates the transaction in a matter of minutes and releases the coins for the receiver to spend or convert.

The conversion value fluctuates with supply and demand  and the trust in the currency. As of last month, there were more than 8.8 million bitcoins in circulation, according to Bitcoin, with a value of about $4 and $5 per bitcoin. The FBI estimates in its report that the Bitcoin economy was worth between $35 million and $44 million.

It’s easy to see the attraction for criminals.

“If Bitcoin stabilizes and grows in popularity, it will become an increasingly useful tool for various illegal activities beyond the cyber realm,” the FBI writes in the report. “For instance, child pornography and Internet gambling are illegal activities already taking place on the Internet which require simple payment transfers. Bitcoin might logically attract money launderers, human traffickers, terrorists, and other criminals who avoid traditional financial systems by using the Internet to conduct global monetary transfers.”

Bitcoin transactions are published online, but the only information that identifies a Bitcoin user is a Bitcoin address, making the transaction anonymous. Or at least somewhat anonymous. As the FBI points out in its report, the anonymity depends on the actions of the user.

Since the IP address of the user is published online with bitcoin transactions, a user who doesn’t use a proxy to anonymize his or her IP address is at risk of being identified by authorities who are able to trace the address to a physical location or specific user.

And a report published by researchers in Ireland last year showed how, by analyzing publicly available Bitcoin information, such as transaction records and user postings of public-private keys, and combining that with less public information that might be available to law enforcement agencies, such as bank account information or shipping addresses, the real identity of users might be ascertained.

But the FBI helpfully lists several ways that Bitcoin users can protect their anonymity.

  • Create and use a new Bitcoin address for each incoming payment.
  • Route all Bitcoin traffic through an anonymizer.
  • Combine the balance of old Bitcoin addresses into a new address to make new payments.
  • Use a specialized money-laundering service.
  • Use a third-party eWallet service to consolidate addresses. Some third-party services offer the option of creating an eWallet that allows users to consolidate many bitcoin address and store and easily access their bitcoins from any device.
  • Individuals can create Bitcoin clients to seamlessly increase anonymity (such as allowing users to choose which Bitcoin addresses to make payments from), making it easier for non-technically savvy users to anonymize their Bitcoin transactions.

But the bigger risk for crooks and others who use bitcoin might not come from law enforcement identifying them, but from hackers who are out to rob their virtual Bitcoin wallets dry.

There have been several cases of hackers using malware to steal the currency in the virtual wallet stored on a user’s machine.

Last year, computer security researchers discovered malware called “Infostealer.Coinbit” that was designed specifically to steal bitcoins from virtual Bitcoin wallets and transfer them to a server in Poland.

One Bitcoin user complained in a Bitcoin forum that 25,000 bitcoins had been stolen from an unencrypted Bitcoin wallet on his computer. Since the exchange rate for bitcoins at the time was about $20 per bitcoin, the value of his loss at the time was about $500,000. A popular web hosting company called Linode was also infiltrated by an attacker looking to pilfer bitcoins.

And there have also been cases of hackers attempting to use “botnets” to generate bitcoins on compromised machines.

According to the FBI, quoting an anonymous “reliable source,” last May someone compromised a cluster of machines at an unidentified Midwestern university in an attempt to manufacture bitcoins. The report doesn’t provide any additional details about the incident.

http://www.wired.com/threatlevel/2012/05/fbi-fears-bitcoin/

 

FBI Supplied the Anarchist “Terrorists” Arrested in May Day Plot

FBI Supplied the Anarchist “Terrorists” Arrested in May Day Plot

 

As the Occupy movement carries out massive May Day protests around the country, the FBI Joint Terrorism Task force is trumpeting the arrest of “self-proclaimed anarchists” and “terrorists” who allegedly conspired to destroy a bridge in Ohio. Integral to the development and advancement of this plot, however, were FBI agents themselves and an informant with a drug and robbery record.

Douglas L. Wright, 26; Brandon L. Baxter, 20; and Anthony Hayne, 35, Connor C. Stevens, 20, and Joshua S. Stafford, 23, were arrested by the FBI on April 30, just in time to make the announcement as the nation turns its attention to May Day protests.

The affidavit reveals a plot by the FBI that continues a pattern of behavior in “terrorism” investigations against political activists. Most importantly, undercover FBI agents helped shape the “plot,” offered advice on how and where to use explosives, and allegedly sold explosives to the activists.

Pervasive Use of Informants and Undercover FBI

The informant in the case has been working with the FBI since July 20, 2011, and has a criminal record including possession of cocaine, conviction for robbery, and four convictions for passing bad checks. (The FBI’s proclivity for using down-and-out criminals was a key issue in the “Operation Backfire” Earth Liberation Front cases. The lead arsonist and informant, Jacob Ferguson, had a heroin addiction, and is now back in prison on drug charges).

The informant and the others haphazardly talked about various plans, starting with the use of smoke grenades and destroying bank signs off the top of large buildings.

For instance, on April 10, 2012: ““…BAXTER explained that he does not know what to do with the explosives and he has never considered blowing anything up before.”

Conversation shifted to other outrageous plans. According to the affidavit, “WRIGHT joked that he would wear a suicide vest and walk in and blow himself up, but advised he would have to be very drunk.”

“The CHS [the informant] asked the others what it is they wanted to do… BAXTER said that they had never decided on the bridge, they were just throwing out options and they had never decided on anything.”

FBI Guidance

The defendants flitted between hyperbolic conversations -– some about destroying bank signs, some about destroying a boat, some about a bridge — and various spy tactics such as secret email accounts, wiping computer drives, and disrupting surveillance. At every step of the way, the informant (who was paid nearly $6,000, plus expenses) and undercover FBI agents were there to correct course.

At one point Wright asked the undercover FBI agent “if there was any work he could do… to pay for the items he was going to purchase” from the agent. Later, Connor Stevens told Wright that he no longer wanted to be part of the plan, but wanted to know if the informant might hire him to do some work on his house.

At another point, Wright told the informant that he and others thought one of the individuals involved was an undercover cop (which he was). To allay his fears, the informant said he would help provide the explosives.

Clamoring to Thwart “Terrorist Plots”

U.S. Attorney Dettelbach called this a violent terrorist plot, and said: “The defendants stand charged based not upon any words or beliefs they might espouse, but based upon their own plans and actions.”

What’s troubling is that the government has had a heavy hand in creating the very plot it thwarted.

And on top of that, the defendants, by the admission of the FBI, said repeatedly that they had no intention of harming anyone. At one point Baxter and Wright “stated they don’t want people to think they are terrorists.”

This isn’t an isolated instance.

The criminal complaint reads like the spitting image of the case of Eric McDavid, who was coaxed  by an undercover FBI operative named “Anna.” In that case, like this one, the FBI supplied bomb making recipes, bomb making materials, and attempts to distill activist boasting and hyperbole into a coherent plan.

McDavid did nothing, and was arrested on conspiracy charges, like these defendants have been. As readers of this site know, conspiracy charges are the fall-back for the government when there is not enough evidence to get anything else to “stick.”

Demonization of Anarchism

In addition to a continuation of undercover informants and FBI-manufactured plots, this case also reflects on on-going focus on demonizing anarchists.

The government’s press release proclaims that the defendants are “self-proclaimed anarchists.” The affidavit notes that they attended anarchist protests and carried anarchist flags.

The affidavit also says that the defendants talked about anarchists “rioting and destroying each city” that holds May Day protests, and that it will be “off the hook.”

Demonizing anarchists has gone one for over a century, of course, but in recent years the rhetoric has dovetailed with “War on Terrorism” hysteria.

For example, in Scott Demuth’s case, the government argued that: “Defendant’s writings, literature, and conduct suggest that he is an anarchist and associated with the ALF movement. Therefore, he is a domestic terrorist.”

In another case, the government sought a high cash bond against environmentalist Hugh Farrell because “the defendant has been observed advocating literature and materials which advocate anarchy.”

It should come as no surprise, then, that the announcement of these arrests was carefully unveiled yesterday, so that the top news story this May Day would not be about how anarchists are preventing home foreclosures, starting community gardens, teaching collective organizing skills, and re-framing class consciousness, but about how they were part of an FBI-guided “terrorist plot.”

by Will Potter on May 1, 2012

SOURCE: http://www.greenisthenewred.com/blog/fbi-anarchist-terrorists-may-day-ohio/5988/

in Terrorism Court Cases

FBI Escalates War On Anonymous

FBI Escalates War On Anonymous

The Feds raid the home of unofficial Anonymous spokesperson Barrett Brown.

They’re after his Twitter records, chat logs, IRC conversations, his computer, and apparently everything else, according to the search warrant obtained by BuzzFeed.

Last month, the FBI raided the Dallas home of Barrett Brown, the journalist and unofficial spokesperson for the Internet hacktivist group Anonymous.

According to the search warrant, the agents were after any information from Brown involving a “conspiracy to access without authorization computers,” one of three serious charges listed in the document.

The Feds seized Brown’s computer and cellphone, searched his parent’s home as well, and demanded his Twitter records, chat logs, IRC conversations, Pastebin info, all his Internet browsing activity, and almost any form of electronic communications Brown conducted.

The warrant, exclusively obtained by BuzzFeed, suggests the government is primarily after information related to Anonymous and the hacking group Lulzec.

The authorities also appear to be interested in info on two private intelligence contracting firms, HBGary and EndGame Systems, two companies Brown has frequently clashed with and criticized on a website he founded called Echelon2.

Brown, a 30 year old journalist who has written for Vanity Fair and the Guardian, is perhaps the most high profile target thus far in the FBI’s investigation into a series of hacks that have shaken the corporate and defense establishment.

Brown, currently at work on a book about Anonymous, believes he’s being wrongly investigated. “I haven’t been charged with anything at this point, although there’s a sealed affidavit to which neither I nor my attorney have access,” he emailed BuzzFeed. “I suspect that the FBI is working off of incorrect information.”

His full statement can be read here.

 

posted 

Michael Hastings | BuzzFeed Staff

Source: http://www.buzzfeed.com/mhastings/exclusive-fbi-escalates-war-on-anonymous

Attention Activists: 17 Techniques for Truth Suppression

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.

2. Wax indignant. This is also known as the “How dare you?” gambit.

3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.” (If they tend to believe the “rumors” it must be because they are simply “paranoid” or “hysterical.”)

4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like “conspiracy theorist,” “nutcase,” “ranter,” “kook,” “crackpot,” and, of course, “rumor monger.” Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the “more reasonable” government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own “skeptics” to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as “old news.”

9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hangout route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster “suicide” note was forged, they would have reported it. They haven’t reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.

12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as “bump and run” reporting.

15. Boldly and brazenly lie. A favorite way of doing this is to attribute the “facts” furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges “expose” scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, “What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?” Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

 

 

 

 

FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers

FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers

The following collection of 25 flyers produced by the FBI and the Department of Justice are distributed to local businesses in a variety of industries to promote suspicious activity reporting. The flyers are not released publicly, though several have been published in the past by news media and various law enforcement agencies around the country.  We have compiled this collection from a number of online sources.

To view the documents, click on a threat area in the menu to the left and the PDF will appear on the right side of the page. You can also download the complete collection of files (ZIP Archive, 6.27 MB).

 

SOURCE:
http://publicintelligence.net/fbi-suspicious-activity-reporting-flyers/

FBI Continues Targeting Peaceful Activists

FBI Continues Targeting Peaceful Activists

F.B.I. targets peaceful anti-fracking and Rising Tide activists, Washington Post reveals

Rising Tide North Texas subject of intimidation campaign by federal government

In today’s Washington Post, it was revealed that the Federal Bureau of Investigation (FBI) has been investigating peaceful climate and anti-fracking activists as a threat. In response to anonymous complaints Rising Tide North Texas, a part of the Rising Tide North America network, has been the subject of an ongoing FBI investigation. The FBI has visited and called for an interview Rising Tide organizer, University of North Texas (UNT) student and a marine veteran of the Afghan war Ben Kessler, as well as UNT philosophy professor Adam Briggle.

“If all I have done to be investigated as a threat is to peacefully express my opinions, then we are in serious trouble,” said Ben Kessler. “Activism is not terrorism. The only dangerous threat in North Texas is the threat that hydro-fracturing, or “fracking,” has on the health and lives of the residents of our communities.”

The article also revealed cooperation between the F.B.I. and local police in Moscow Idaho around repeated protests organized by Wild Idaho Rising Tide around the tar sands heavy haul truck shipments.

Here is the article:

As eco-terrorism wanes, governments still target activist groups seen as threat

By Juliet Eilperin, Updated: Saturday, March 10, 5:12 PM

Ben Kessler, a student at the University of North Texas and an environmental activist, was more than a little surprised that an FBI agent questioned his philosophy professor and acquaintances about his whereabouts and his sign-waving activities aimed at influencing local gas drilling rules.“It was scary,” said Kessler, who is a national organizer for the nonviolent environmental group Rising Tide North America. He said the agent approached him this past fall and said that the FBI had received an anonymous complaint and were looking into his opposition to hydraulic fracturing, also known as “fracking.” The bureau respected free speech, the agent told him, but was “worried about things being taken to an extreme level.”

Even as environmental and animal rights extremism in the United States is on the wane, officials at the federal, state and local level are continuing to target groups they have labeled a threat to national security, according to interviews with numerous activists, internal FBI documents and a survey of legislative initiatives across the country.

Iowa Gov. Terry Brandstad (R) signed a law this month, backed by the farm lobby, that makes it a crime to pose as an employee or use other methods of misrepresentation to get access to operations in an attempt to expose animal cruelty. Utah passed a similar bill, nicknamed an “ag-gag” law, on Wednesday. Last month, Victor VanOrden, an activist in his mid-20s, received the maximum sentence of five years in prison under a separate Iowa law for attempting to free minksfrom one of the state’s fur farms.

At the same time, though, acts that might be defined as eco-terrorism are down. In recent years, the broad definition has included arson, setting mink free at fur farms, campaigns to financially bankrupt animal testing firms and protests in front of the homes of some of those firms’ executives.

Michael Whelan, executive director of Fur Commission USA, estimated that in the 1990s “there were close to 20 attacks per year on our farmers” and that since 2003 there have been fewer than two attacks a year on American mink farms.

“Overall we’ve seen a decline in activity, in terms of violent criminal activity,” FBI intelligence analyst Erin Weller said in an interview.

FBI officials say two factors contribute to the reduced threat.

One is their successful prosecutions of several activists, in particular the 15 convictions in 2007 for members of the Earth Liberation Front. The national sweep of radical environmentalists was chronicled in the Oscar-nominated 2011 documentary “If a Tree Falls.” Not only did several ELF members get long prison sentences — Stanislas Meyerhoff got 13 years — but also many activists testified against others to get lighter punishments.

“That’s had an impact on the movement as a whole,” Weller said.

The second factor is that environmental and animal rights activists may view a Democratic administration as more sympathetic to their goals and be less inclined to take radical steps.

“Obviously if you think there is going to be support for your position, you’re going to use legal means rather than illegal means,” Weller said.

Despite the decline in activity, the level of scrutiny has continued, say several who track state and federal enforcement.“There’s been very little change under the Obama administration,” said Will Potter, author of the book “Green is the New Red: An Insider’s Account of a Movement Under Siege.” After factoring in several state initiatives on top of federal enforcement, Potter said, “The political climate as a whole has gotten a lot worse.”
Read the rest of the article here

SOURCE:
http://www.risingtidenorthamerica.org/2012/03/f-b-i-targets-peaceful-anti-fracking-and-rising-tide-activists-washington-post-reveals/#

By:  Scott Parkin, March 11, 2012

Nikola Tesla: Murdered by Otto Skorzeny?

Nikola Tesla: Murdered by Otto Skorzeny?

Otto Skorzeny’s  Deathbed Confession

… edited by  Sir Vojislav Milosevic,

Director, Center for Counter-terrorism & World Peace   

 

Nikola Tesla was one of the greatest and most gifted men ever to have walked this Earth.

A huge amount has been written about the prodigal genius of Nikola Tesla and so there may not be a great need to say more here about his life, his brilliance, his vision, and his achievements.

But in brief, Tesla was an extraordinary, intuitive, creative genius who, among a great deal else, invented alternating current (which powers the the modern world) and radio (for which Marconi is often falsely given credit).

Contemporary biographers of Tesla have deemed him “the father of physics”, “the man who invented the twentieth century”, and “the patron saint of modern electricity”.

Much of his life’s work was about providing for the world free (i.e. zero-cost) energy, which Tesla envisaged would be broadcast wirelessly through the air or through the Earth itself with no need for powerlines – but despite years of trying, he never obtained the funding to achieve this, one of his dreams.

It has long since been rumored that he invented or developed a significant number of electrical and electronic devices which were decades ahead of their time and would have been of special interest to US military and intelligence circles. Around 300 patents were issued to Tesla in 25 countries, many of them major and far-reaching in concept.

The reality of Tesla’s murder was brought home to us after listening to this Youtube presentation. Eric Bermen tells Greg Syzmanski how he discovered his former girlfriend was the daughter of ex-Nazi SS Commando Otto Skorzeny, and thereby quite by chance met the elderly Skorzeny who had been living for years in the US, working as a carpenter with a new identity supplied by the CIA after WWII.

Bermen (who sometimes uses the pseudonym Eric Orion) heard a full confession from Skorzeny, who was nearing the end of his life, and was given a shoebox full of over a hundred photographs to substantiate his claims.

Among a number of other highly significant revelations, Bermen heard from Skorzeny that he had personally suffocated Nikola Tesla on January 6, 1943, assisted by fellow-Nazi Reinhard Gehlen. Tesla was then 86 years old.

According to Skorzeny, he and Gehlen had tricked Tesla the previous day into revealing the full details of his most important discoveries. After the murder, they stole the contents of Tesla’s safe, which were delivered to Hitler. (Note, of course, that the US military would have fully repatriated this treasure trove of innovation through Project Paperclip at the end of the war.)

Otto Skorzeny was Hitler’s bodyguard & also an assassin, one of the many Nazis who ex-filtrated to the USA after WWII, as part of Project Paperclip. Many of these Nazi scientists ended up working for NASA, the CIA, and other US secret services.

Although he supposedly died in 1975 in Spain, Skorzeny resurfaced in 1999. Otto Skorzeny described how (“contrary to the CIA-written history books”) he helped Hitler escape to Austria in a plane flown by a female pilot, Hanna Reitsch.

“Hitler did not commit suicide,” Skorzeny recounted. “His double was shot between the eyes, and the dental records proved he was not Hitler. The Americans kept it a secret, worried the truth might anger the Russians.”

A Young Tesla

Despite conflicting literary and historical accounts, Nikola Tesla, a Serb, was born on July 10, 1856, in Smiljan, Lika Serbian province, Austro-Hungarian Empire of that time, or what is now modern-day Croatia. Prior to World War I, Smiljan was on the border of the Austro-Hungarian empire.

The son of a Serbian Orthodox priest who rose to the rank of Archbishop, Tesla had the opportunity to study a variety of topics contained in his father’s personal library. As a young boy, he accompanied his father on trips to Rome, where he was able to study the lesser-known works stored in the Vatican’s vast scientific repository.

Upon completing his studies in engineering and physics at the Polytechnic Institute in Graz, Austria, Tesla attended the University at Prague. He demonstrated, early on, an innate ability to solve mechanical and scientific problems, especially in the area of electricity and its applications in power production.

After working for Edison Telephone Company subsidiaries in Budapest, Paris, and other cities throughout Europe, Nikola Tesla went to America, to meet the man whose company gave him his first job, Thomas Edison.

Tesla found it difficult to work for Edison (due to Edison’s reneging on financial promises), but soon found backers to finance his research and development projects and his new inventions.

Financiers, such as John Pierpont (J.P.) Morgan, George Westinghouse and John Jacob Astor were among those who saw the potential in Tesla’s pioneering, entrepreneurial spirit to capitalize on his technological discoveries in electricity, wireless communications, and physics.

The only official documentation of Nikola Tesla’s arrival to the United States was, again, produced at the Port of New York. [9] On April 7, 1882 a 25-year old Tesla arrived via the SS Nordland, which departed from Antwerp. He had returned, on this trip to the U.S., after lecturing in Paris.

Tesla’s destination: New York. Tesla immigrated as a “laborer,” though this label hardly befit the man who would become the most prolific inventor in history, with some 700 technological patents to his credit. Previous accounts of Tesla’s association with Thomas Edison’s projects place him in the United States in the 1870s.

Tesla in Colorado Springs Lab

His many technological discoveries were certain to have drawn the attention of those hungry for world domination and superiority.

By and large, Tesla’s inventions and his career were excluded from our history books because his inventions and patents were stolen and then weaponized.

It was never intended for us to learn about the suppression of Tesla’s advanced scientific discoveries, nor about those who profited from their theft—the orchestrators of the master plan.

Though much has been written about Tesla’s successes and failures, few have detailed the behind-the-scenes financial activities which disclose a Nazi plot to acquire his technology, while research and development costs had largely been paid (unknowingly) by U.S. taxpayers.

Many of Tesla’s patents fell into Nazi hands prior to and during World Wars I and II. As a result, Tesla continuously found himself in litigation over patent rights and other issues.

Although he had succeeded in winning the majority of his patent lawsuits, his technology had been repeatedly stolen and sold to the German Nazis and other foreign governments, so he never achieved the financial success he deserved.

The embezzlement of his capitalization went unchecked throughout Tesla’s career. At the time of his death (by murder, according to Skorzeny) on January 6, 1943, Tesla died virtually penniless.

On Good Friday, Ortodox Christmas Eve, he was found in bed, dressed in solemn black suit, arms folded on his chest. They say that a great mind felt his death is coming , he put on the solemn black suit – and then died. An incredible lie and mission impossible, even for a great mind as it was Nikola Tesla.

Tesla’s Ashes are preserved in a Gilded Sphere – His Favorite Shape

This is the ultimate proof that he was murdered and his killers dressed him in a suit and left him in the bed! His killers: Otto Skorzeny and Reinhard Gehlen. Nikola Tesla’s successes in discovering new technologies did not go unnoticed by many industrial capitalists and world governments.

In fact, many of his inventions were developed through secret government programs which began soon after his discoveries in alternating current (AC), electromagnetic energy, electric motors, generators, coils, radio transmission, energy-saving devices, and wireless transmission technologies.

Since Tesla was often buried deep in research at remote labs, many of his financial and legal affairs were supervised by his closest associate, George H. Scherff.

Scherff often advised Tesla about pending patent litigation, contracts, proposals, demonstrations, and financial affairs.

As any trusty associate would, Scherff stood beside Tesla through all the ups and downs of his financial nightmares, sometimes arranging for extended credit at the Waldorf-Astoria, where Tesla often resided, or by obtaining a cash advance toward research he had been contracted to perform.

Near the end of his career, Tesla was evicted from the Waldorf for an outstanding bill which exceeded $20,000 — a rather large sum for those days.

As Tesla worked on secret U.S. government projects at Colorado Springs, Colorado, Scherff communicated to Tesla the status of his business affairs. Tesla spoke of hopeful, future financial successes, though Scherff repeatedly delivered the news of dwindling funds. Tesla had begun construction of a wireless power transmission tower (“Wardenclyffe,” Shoreham, Long Island) with funds invested by J.P. Morgan.

Tesla’s Tower

When Morgan discovered that the tower would transmit free electricity and radio waves, he cancelled the project and had the tower dismantled, then sold for scrap. Morgan was not about to allow Americans to receive free electricity, television and radio.

Tesla was devastated when he received the news, but continued on with his new inventions. The Rockefeller Connection Records show that 17 Battery Place is the Whitehall Building and was owned by Frank Rockefeller, who, with his brothers William and John D., also owned many of the companies with offices located there.

The International Longshoremen’s Association (ILA) had its world headquarters there, as well as a variety of oil, mining, and chemical companies.

Though Union Sulphur Company was run by its president, Herman Frasch, a German chemist who patented extraction methods for sulphur and petroleum, Frasch also worked for John D. Rockefeller’s Standard Oil Company (in New York, New Jersey, and Cleveland, Ohio), developing similar extraction methods.

Frank Rockefeller was also an investor of Buckeye Steel Castings in Columbus, Ohio. Buckeye manufactured automatic couplers and chassis for railroad cars owned by the Harrimans, the Rockefellers, and J.P. Morgan. Eventually, Samuel P. Bush was promoted from general manager to president of the company after producing gigantic profits.

Samuel P. Bush’s association with the Rockefellers and his subsequent position as Director of the War Industries Board afforded him the opportunity to create contracts with Remington Arms during the war, courtesy of Percy Rockefeller. Nikola Tesla’s trusted assistant (sometimes referred to as “accountant” or “secretary”) George Scherff, Sr., worked at Union Sulphur Company.

Normally, this association would not set off alarms, considering the state of Tesla’s affairs. Scherff had every right to earn a decent living in order to support his family. That was “the American Way.” But a careful examination of Union Sulphur Co. might reveal that someone was being deceived — Tesla, and Scherff was at the root of this deception.

Who was George Scherff? Who was George Scherff? Better yet, who was George H. Scherff, Sr.? There exists no legitimate record of a George H. Scherff being born in the U.S. from the late-1800s through 1925, yet, George Scherff was Nikola Tesla’s assistant/accountant.

Only one photograph in public circulation records the face of George Scherff, Sr. -at the Association of Radio Engineers banquet of 1915 (above). Tesla is seen standing tallest in the middle of the back row, while Scherff stands at the end of the same row to Tesla’s left, his hands visible at his sides.

If he was born in Germany, could his birthplace shed some light on this mystery? Probably—if they exist (it has become apparent that individuals associated with the Nazi Party commonly have all or parts of their genealogical records expunged—we will explore this further in the section of this article dealing with the “Bush” family tree).

In short, Otto Skorzeny claimed that the true identity of George H.W. Bush was “George H. Scherff, Jr., the son of Nikola Tesla’s illegal-immigrant, German-born accountant, George H. Scherff, Sr.”

Worth a thousand words: But this was not the only bombshell Otto Skorzeny delivered that day in late-1999. Skorzeny, producing a shoe box full of 60-years worth of his personal photographs, showed them to Berman, describing each one in great detail.

The collection featured a photo of a young, majestic Skorzeny in full S.S. Nazi military dress, next to his Fьhrer, Adolph Hitler. Then there were photos of Reinhard Gehlen (S.S. spy and assassin) Dr. Joseph Mengele (the “Angel of Death”) Martin Bormann (Hitler aide and S.S. assassin) .

 

Eric “Orion” (Berman), in a live radio interview on Republic Broadcasting Network, January 17, 2006, detailed how:

“Skorzeny died on December 31, 1999. His body was cremated, I have a copy of his death certificate, and I saw his ashes. After the war, he helped George Bush found the CIA through Operation Paperclip and ODESSA.”

Berman recounted how Skorzeny was found “not guilty” at the Nuremburg trials, and then ushered into the CIA. “Some 50,000+ S.S. Nazi war criminals, not just rocket scientists, were brought to America after the war.”

Skorzeny, about age 90 at the time, was described by Berman as “very focused and very lucid, and he was still very mobile. He was still able to walk around—he was still very impressive and he had about the biggest hands I have ever shaken. He was 6’-4”and was a giant for his day. He towered over me, and I’m 5’-8”.”

When asked why he thought Skorzeny entrusted this information to him, Berman responded,

“I was dating one of his daughters. He knew that I’m Jewish, first of all, I’m an honest guy and he thought that I would really try to do something about this and bring some justice, yeah, to these wanted Nazi war criminals.

His whole goal was…. they had screwed him over, including George Bush, they screwed him over….. and out of large sums of money over the years. This was his one last way of… you know, getting even with them.”

A biographical article about Nikola Tesla appeared in the Tesla Tech, Inc. magazine, “Extraordinary Technology,” Volume 4, Number 3, Aug., Sept., Oct., 2006. The article, written by Dustin Wallace, spoke of Tesla’s childhood, some of his inventions, and his last days. Wallace wrote (pp. 21-22), “The Yugoslav Monarchy in Exile was summoned to visit Tesla in the fall of 1942.

However, Charlotte Muzar, a secretary, paid Tesla the visit. From his condition upon her arrival she felt as though he may not live through the night. Another friend of Tesla’s, Kenneth Swezey visited him during the time and noted that he was existing on warm milk and Nabisco crackers alone.

It was apparent that Tesla was nearing the end of his time. By late December of 1942, Tesla began meeting with two U.S. government agents in order to share some of his most sensitive discoveries. These men carried away many of his documents for microfilming.”

“On January 4, 1943, Tesla’s faithful assistant, George Scherff, visited Tesla for the last time, Tesla was found deceased in his hotel room on the morning of January 8. 1943. He had passed away between those four days since Scherff’s visit.”

The article continued, “Following Tesla’s death the United States Office of Alien Property, under the instructions of the Federal Bureau of Investigation, confiscated all of Tesla’s papers and property. This was an interesting maneuver considering that Tesla was a United States citizen.”

The significance of this benign description of Tesla’s inventions and his last days has a direct relationship to the previously unknown claims of Otto Skorzeny. As Skorzeny described (to Berman) in detail his involvement with George H. W. Bush (George H. Scherff, Jr.) in organizing the CIA by absorbing Nazi S.S. agents,” he intimated that it was Reinhard Gehlen and himself who murdered Nikola Tesla on January 6, 1943 by strangulation/suffocation.

Prior to the murder, Skorzeny and Gehlen “spoke in great detail to Tesla about his most-advanced technologies and then stole the blueprints of his best, most-secret inventions.”

Were these the “two U.S. government agents” about whom Dustin Wallace wrote? The timing of George Scherff’s last visit to Nikola Tesla was suspicious, as well.

Skorzeny did not stop with these soul-cleansing disclosures. He went on to describe the aliases of himself Frank Edward P_ _ _ _ _, of south Florida (according to Berman, who claims he is trying to protect Skorzeny’s daughter), Reinhard Gehlen (Hank Janowicz, Wayne, N.J.), and Dr. Joseph Mengele (Steven Rabel).

According to Berman,

“Gehlen was tipped off by the FBI about Skorzeny’s unveiling of his identity and location, and Gehlen (Janowicz) then went into hiding. Mengele (Rabel), through a series of anti-aging hormone injections, a black hairpiece, and ‘cannibalism’ has maintained a youthful appearance.”

Having investigated some of Skorzeny’s claims, Berman had contacted the U.S. Justice Department to inform them that Nazi spies were being harbored by certain factions of the U.S. intelligence agencies, in particular, the CIA. “My thoughts were that, uh, I needed to try to bring these wanted SS Nazi war criminal, holocaust killers—terrorists, basically—to justice.

I wanted to call our government and tell ‘em, ‘Hey, that they’re still alive.’ I wanted to bring ‘em to justice. That was my whole intention. I initially had contacted, or tried to contact Eli Rosenbaum, who was the Director of the United States Justice Department, Office of Special Investigations.

Basically, they, uh, thought it was a hoax and they told me that I was mistaken, and that according to the CIA, ‘all of them were all dead and I was mistaken.’ That’s what they told me. I was wrong.“

Monday, February 13th, 2012 | Posted by

 

SOURCE: http://www.veteranstoday.com/2012/02/13/nikola-tesla-was-murdered-by-otto-skorzeny/

How to Spot an Online Spy (Cointelpro Agent)

One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?

1) The message doesn’t get out.
2) A lot of time is wasted
3) The activist is frustrated and discouraged
4) Nothing good is accomplished.

FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.

Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.

Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.

The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.

This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.

It is the agent’s job to keep the activist from quitting such a group, thus keeping him/her under control.

In some situations, to get control, the agent will tell the activist:

“You’re dividing the movement.”

[Here, I have added the psychological reasons as to WHY this maneuver works to control people]

This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of “dedication to the cause.” Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she – being truly dedicated to the movement – becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that “on purpose.” It’s amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: “they did that unconsciously… they didn’t really mean it… I can help them by being forgiving and accepting ” and so on and so forth.

The agent will tell the activist:

“You’re a leader!”

This is designed to enhance the activist’s self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.

This is “malignant pseudoidentification.” It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist’s identification with him/her, thus increasing the activist’s vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.

Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.

The goal of the agent is to increase the activist’s general empathy for the agent through pseudo-identification with the activist’s self-concepts.

The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of “twinship”. It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.

The activist’s “felt quality of perfection” [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim’s own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is “mirroring” them.

The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that “twinship alliances” between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally “lose touch with reality.”

Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be “helpers” endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.

Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist’s narcissistic investment in self as the embodiment of goodness.

The agent’s expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.

It can usually be identified by two events, however:

First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being “emotionally hooked,” will be able to remain cool and unaffected by such emotional outpourings by the agent.

As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that “the play has ended, the curtain has fallen,” and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.

The fact is, the movement doesn’t need leaders, it needs MOVERS. “Follow the leader” is a waste of time.

A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.

Some agents take on a pushy, arrogant, or defensive manner:

1) To disrupt the agenda
2) To side-track the discussion
3) To interrupt repeatedly
4) To feign ignorance
5) To make an unfounded accusation against a person.

Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.

Saboteurs

Some saboteurs pretend to be activists. She or he will ….

1) Write encyclopedic flyers (in the present day, websites)
2) Print flyers in English only.
3) Have demonstrations in places where no one cares.
4) Solicit funding from rich people instead of grass roots support
5) Display banners with too many words that are confusing.
6) Confuse issues.
7) Make the wrong demands.
Cool Compromise the goal.
9) Have endless discussions that waste everyone’s time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist’s work.

Provocateurs

1) Want to establish “leaders” to set them up for a fall in order to stop the movement.
2) Suggest doing foolish, illegal things to get the activists in trouble.
3) Encourage militancy.
4) Want to taunt the authorities.
5) Attempt to make the activist compromise their values.
6) Attempt to instigate violence. Activisim ought to always be non-violent.
7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.

Informants

1) Want everyone to sign up and sing in and sign everything.
2) Ask a lot of questions (gathering data).
3) Want to know what events the activist is planning to attend.
4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.

Recruiting

Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.

Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.

Surveillance

ALWAYS assume that you are under surveillance.

At this point, if you are NOT under surveillance, you are not a very good activist!

Scare Tactics

They use them.

Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up “exposure,” they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.

This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.

If an agent is “exposed,” he or she will be transferred or replaced.

COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.

The FBI counterintelligence program’s stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. “National Security” means the FBI’s security from the people ever finding out the vicious things it does in violation of people’s civil liberties.

 

 

SECRECY: The Hidden Agenda

SECRECY: The Hidden Agenda

Secrets are More Often Conspiracies and Shame and Seldom are National Security

Let’s start this out with an attention grabber.  Out there, somewhere is a photograph of Osama bin Laden and George H. W. Bush, shaking hands in the White House.  It exists.  There is this and more, so much more, that would make America’s heads spin.

The actual trained journalists around me beat this into my head. OK, here it is.

Those who follow rumors, which means every single one of us, know that former President George H. W. Bush worked with the bin Ladens, a wealthy and respected Saudi family that invests in a group of military companies called The Carlyle Group, headed by many former world leaders.

When Osama bin Laden, the short haired young Saudi millionaire CIA agent visited Bush in the White House, he came there, not just as an important part of our intelligence infrastructure at the end of the Cold War, but as a good friend of George H. W. Bush, a man who was  practically an uncle to him.

“Hey Osama, I mean Tim”…”Get Over Here and Get in the Picture!”

Wait a minute, wouldn’t that make George “W” Bush Osama bin Laden’s brother?  Well, not a real brother, not like Jeb anyway. Bin Laden was taller and better looking and, as the CIA transcript below indicates, certainly better educated and more honest.  Be sure to read the only certified statement ever made by Osama bin Laden about 9/11 and compare it to what you are told he had said.

Then rememer the last 10 years how many times you have been told bin Laden claimed credit for 9/11.  Each of those video and audio recordings were presented to news agencies by proven agents of the Israeli government and have, after examination, all been shown to be counterfeit.

The news has refused to report either of these facts.

We might also add, Osama bin Laden, were he of “that” Bush generation, was a veteran, having risked his life defending the United States against Russia many times.

The Bush boys shunned wartime service as we well know, perhaps they saw brother “Tim” as doing their part for them. (Tim “bin Laden” Osman)

No wonder Bush thought the 9/11 attacks were “pilot error” and not “Brother Tim” gone bad.  The video below actually has President Bush citing 9/11 as “pilot error.”

The president’s immediate responses to the 9/11 attacks are among the most amazing pieces of inappropriate humor since Caligula nominated his horse to the Roman senate:
YouTube – Veterans Today –

Does this put the fact that the bin Laden family was evacuated from the United States, the safest place on Earth for them, on 9/12/2001 rather than have any of them interviewed by the FBI in perspective?

A plane load of Israelis left also, had to escape the United States, which had suddenly become terrifyingly dangerous to an entire planeload of trained Mossad agents, supposedly the among the most dangerous people on earth.

Was Bush their uncle too?  We wonder.

The cover story is that their son, Osama, went a bit off and began blowing things up.  We have secrets that disprove this as a wild conspiracy, or worse, “cover and deception.”

To the CIA and top US officials, Osama bin Laden was Tim Osman, his cover name. 

He held an equivalent US military rank, had broad security clearances through the American government and received a salary for decades. Someone has access to his history, to his files.  It gets worse, worse than I had known, worse than I had suspected.

Tim Osman in Military Uniform with Brzezinski

I had discussed bin Laden with General Hamid Gul, with Susan Lindauer and with his CIA handlers.

I had been asked, after the announcement of the bin Laden killing to reaffirm what General Gul, the foremost expert told me, what I heard from official sources that also briefed General Petraeus and Secretary Clinton (same briefing) to tell the truth.

Osama bin Laden, known by his friends as Tim Osman, spoke English, was always loyal to the US and was deeply trusted by the CIA despite their “bin Laden unit” and the endless hunts for him and a supposedly connected group, the 9/11 hijackers.

Let’s take a second look at the hijackers.  Those who knew that a group of Arabs were being trained in the US, some paid by FBI funds, entertained by GOP lobbyist Jack Abramoff  and said to be planning a new attack on the World Trade Center have suffered for that knowledge.

Well over a year ago, Fox News “outed” this operation, partially at least, with proof that the US government knew about 9/11 in advance.  Here is one of the broadcasts but is only part of the story:

YouTube – Veterans Today –

What we have since learned is that the evidence brought forward about the attacks was a deception plan for the real attack, which was staged by the US government along with help from Israel.  Passenger lists show no hijackers, phone bills show no calls from planes, no box cutters and many of those said to have died as suicide hijackers have tried to file suit against the US governent for defamation.

They are alive and more than willing to prove it.  The “hijackers” were clones.  My personal belief is that they were  on the plane to Tel Aviv on September 12, 2001.   Many FBI agents believed the same.  All have been silenced.

If Jews had to be taken out of America, why leave 14 million behind?  Who was on the plane, why?  There was only one purpose for the flight, to avoid the FBI.  There was only one purpose for that.  The “hijackers” were on the plane along with demolition teams, this is what FBI officials said they beleive.  There are no films, no tickets, there were no passport checks and the flight left on the personal authority of President Bush.  Where they not terrorists, there was no other possible reason for the flight.

If you can think of one, any reason, let me know.  If you have access to a single airport employee who saw one person board the plane, a video, a passenger list anything, ten years later, please come forward.  Secrecy has one purpose, to cover crimes committed by governments.  If you wanted a real secret, call Tel Aviv or China, they have had those from day one, as anyone knows.

Here is General Hamid Gul, America’s top intelligence resource in Central Asia at the time, talking about this:
YouTube – Veterans Today –

I have met other CIA and FBI employees including one former member of congress who knew also.  Two of the CIA employees were locked in psychiatric facilities to keep them from reporting “officially” to the president, both charged with crimes and one jailed.

Sibel Edmonds

The FBI employee I have spoken with is Sibel Edmonds.  She was officially silenced by the US government for 6 years, court order under threat of imprisonment.

It goes further.  One of the companies paying the hijackers, a company known to be CIA related, part of a major insurance conglomerate on the “bail out” list was run by one of my friends.

If you are thinking AIG/Kroll, you are getting warm.

He had been the head of a famous foreign police intelligence service.  Sherlock Holmes fans will get the idea.

His brother was CFO of this company at the center of “black ops,” much more secret and high level than Blackwater ever was.  His brother was murdered.

Then there was FBI agent John O’Neill:
YouTube – Veterans Today –

He died on 9/11.  He knew, and he was silenced.  How many were silenced?

Osama bin Laden reported that 9/11 was an inside job before his death, confirmed through the highest sources, December 13, 2001.  This is the official CIA transcript of that report:

CENTRAL INTELLIGENCE AGENCY FOREIGN BROADCASTING INTERNATIONAL SERVICE:

FOR OFFICIAL USE ONLY

Website of Doha Al-Jazirah Satellite Channel Television in Arabic  [FBIS Report] Website of Doha Al-Jazirah Satellite Channel Television in Arabic,independent television station financed by the Qatari Government, which can be accessedat URL: http://www.aljazeera.net, carries at 2011 GMT on 24 September the text of the following letter by Usama Bin Ladin “to the Pakistani people.”

  • “We hope that these brothers would be the first martyrs in Islam’s battle in this age against the new Jewish crusade that is being led by the biggest crusader, Bush, under the banner of the cross. This battle is one of Islam’s immortal battles.”
  • “We beseech God to grant him victory against the forces of infidelity and arrogance, and to crush the new crusader-Jewish campaign on the land of Pakistan and Afghanistan.”
  • “I have already said that I am not involved in the 11 September attacks in the United States.”
  • “Neither I had any knowledge of these attacks nor I consider the killing of innocent women, children, and other humans as an appreciable act. . Islam strictly forbids causing harm to innocent women, children, and other people. Such a practice is forbidden ever in the course of a battle.”
  • “All that is going on in Palestine for the last 11 months is sufficient to call the wrath of God upon the United States and Israel.”
  • “Whoever committed the act of 11 September are not the friends of the American people. I have already said that we are against the American system, not against its people, whereas in these attacks, the common American people have been killed. According to my information, the death toll is much higher than what the US Government has stated.
  • “The United States should try to trace the perpetrators of these attacks within itself; the people who are a part of the US system, but are dissenting against it. Or those who are working for some other system; persons who want to make the present century as a century of conflict between Islam and Christianity so that their own civilization, nation, country, or ideology could survive.”
  • “They can be any one, from Russia to Israel and from India to Serbia.”
  • “Then you cannot forget the American Jews, who are annoyed with President Bush ever since the elections in Florida and want to avenge him.”
  • “Then there are intelligence agencies in the US, which require billions of dollars worth of funds from the Congress and the government every year. This [funding issue] was not a big problem till the existence of the former Soviet Union but after that the budget of these (FOR OFFICIAL USE ONLY 180)  agencies has been in danger. They needed an enemy. So, they first started propaganda against Usama and Taliban and then this incident happened.”
  • “Drug smugglers from all over the world are in contact with the US secret agencies. These agencies do not want to eradicate narcotics cultivation and trafficking because their importance will be diminished. The people in the US Drug Enforcement Department are encouraging drug trade so that they could show performance and get millions of dollars worth of budget. General Noriega was made a drug baron by the CIA and, in need, he was made a scapegoat.”
  • “President Bush or any other US President, they cannot bring Israel to justice for its human rights abuses or to hold it accountable for such crimes. What is this? Is it not that there exists a government within the government in the United Sates? That secret government must be asked as to who made the attacks.”
  • “Supporting the US act is the need of some Muslim countries and the compulsion of others. However, they should think as to what will remain of their religious and moral position if they support the attack of the Christians and the Jews on a Muslim country like Afghanistan.”
  • “I have already said that we are not hostile to the United States. We are against the system, which makes other nations slaves of the United States, or forces them to mortgage their political and economic freedom.”
  • “This system is totally in control of the American Jews, whose first priority is Israel, not the United States. It is simply that the American people are themselves the slaves of the Jews and are forced to live according to the principles and laws laid by them. So, the punishment should reach Israel.”
  • ”The Western media is unleashing such a baseless propaganda, which make us surprise but it reflects on what is in their hearts and gradually they themselves become captive of this propaganda. They become afraid of it and begin to cause harm to themselves.”
  • “Terror is the most dreaded weapon in modern age and the Western media is mercilessly using it against its own people. It can add fear and helplessness in the psyche of the people of Europe and the United States. It means that what the enemies of the United States cannot do, its media is doing that. You can understand as to what will be the performance of the nation in a war, which suffers from fear and helplessness.”

FOR OFFICIAL USE ONLY     END OF OFFICIAL TRANSCRIPT

This transcript makes every word said about bin Laden a lie, every news report, every statement by our presidents and congress, if they lie about this, what else do they lie about?  It gets worse, much worse.

BIN LADEN USA

CIA files that dozens of members of congress have access to and dozens of journalists have seen introduce these facts:

  • Osama bin Laden had a cover name, Tim Osmon
  • Osama bin Laden was brought to the US through the airport in Ontario, California and settled in the San Diego area for a number of years.
  • He was paid by FBI funds and maintained contact with a number of high ranking individuals that I can name, but the last person doing something similar, is in jail.   The names include CIA, US Army, FBI and Department of the Treasury.
  • Tim Osmon, AKA Osama bin Laden visited the White House on at least one occasion.  Staffers there report the visit and witnessed Tim Osmon, yes, we are talking about Osama bin Laden meeting with George Herbert Walker Bush in the White House.
  • This is a fully confirmed report.

While bin Laden is accused of 9/11, others working in the White House tell us that Richard Clarke, managed secret projects for the Bush administration and Pentagon prior to 9/11 that puts his picture on the “wanted list” where bin Laden never belonged.

OTHER THINGS

The president mentioned during his State of the Union address that congress should pass laws outlawing “insider trading.”  If any other American were to do it, they would go to jail.  Hundreds having committed crimes that members of congress commit every day are in federal prison.

On national television, the President of the United States announced that many members of congress are criminals and asked that they rescind the laws they passed that allow them to commit criminal acts and avoid prosecution.

Insider trading would cause members of congress to act against the interests of the American people and for corporations.  It would also turn members of congress into, not just millionaires, but full-fledged members of criminal organizations.
YouTube – Veterans Today –

If you just watched the video, you saw the president tell congress to stop being criminals.  They applauded as though they wanted to stop stealing.  I nearly fell off my chair.

First of all, I thank any person in Washington who tells the truth, which Obama did. But at the end of the broadcast, using laws on the books, 80% of the people sitting behind the desks, in the good seats, including members of the US Supreme Court, should have been arrested and jailed.

Congress does not have the right to pass laws that legalize criminal acts on their own part.

They did it !!

You heard about it.  This isn’t even close to the beginning and there are still people who believe that airplanes knocked down the World Trade Center or who don’t know the movie, “Flight 93″ was, every single word of it, a total fiction.

Top US officials have actually come to me asking where I think the plane went and what happened to the passengers.  I told them.  It was a guess.  They wanted my guess.  You don’t get that guess today.

Here is another way of looking at it.  Only the President of the United States has authority to pardon or commute sentences for those convicted of or seeking immunity from federal prosecution.

In passing legislation that abrogates that right, legalizing violations of federal law by members of the legislative branch, the number of unconstitutional acts involved is almost countless.

Not only does this overrule separation of powers as outlined in the constitution, it is, in itself,  a usurpation, it essentially turns any authority empowered with the protection of the constitution, with or without writ of mandamus, that fails to act, into a party to criminal activity.

Congress has, in protecting itself from both civil and criminal remedies other than its of “witch hunts” against carefully chosen scapegoats, put itself above the law.  There is one purpose for that.  Members of congress continually commit serious felonies.  This means we are voting for criminals.

Does this make sense now?

DRUGS, A CONGRESSIONAL FRANCHISE

Actually, it goes further than congress.  One presidential candidate, a very wealthy one, uses his “offshore accounts” to launder drug money.  The only reason for the offshore accounts is to take drug profits, by truck, into Mexico, paying off
customs officials on both sides of the border and moving the money into secret corporate accounts in the Cayman Islands.

“Ah…I think we need a faster process.”

Not one scrap of information has been submitted on these accounts, where the money came from or how much is there.  It could be $75 billion or more.

There isn’t one scrap of evidence it was “earned,” in fact, were it earned, it couldn’t be in Cayman accounts. There would be a trail of taxes and clear evidence of investments or business enterprises which simply don’t exist.

Several years ago, Colonel Eugene Khrushchev, former First Secretary representing both the Soviet Union and Russian Republic in Kabul came to me with a story.

He said that Richard Hollbrooke, the top US official in Afghanistan was, in fact, managing the world’s largest drug empire.  Hollbrooke is dead now but the drugs continue to flow, $80 billion per year.

Others worked to find how Afghanistan went from a few hundred pounds of opium paste per year to tons of heroin flown around the world by private airlines contracted to the CIA.

Then we found irrigation projects, paid for at Hollbrooke’s request, costing millions, that watered opium poppies.

Then we found agricultural programs under USAID that moved opium production to areas more suited for that plant, upping production.  We even found the US aiding Afghanistan in buying shiploads of fertilizer to increase opium production.

Afghan Drugs Has Been a Huge Source of Corruption – A Rare Seizure Here Because it was Taliban Dope

Then, an investigative reporter came to me with evidence that current and former members of congress, some involved in organizations supposedly supporting a peaceful settlement in Afghanistan were, in actuality, importing chemicals used to convert opium to much more valuable heroin.

These efforts received full US government subsidies and protection and, in addition, paid taxes to the Taliban.

This is going on today and you are paying for it. The heroin, part of it, is being sold to your children.

It is being sold to everyone’s children as America now supplies 97% of the world’s heroin and smaller percentages, in some cases not much smaller of other drugs, cocaine, ecstasy, “meth” and is involved now in cultivating new strains of marijuana.

That, in itself makes me suspicious as it may actually be useful.

JOHN KIRIAKOU, CIA AGENT UNDER ARREST

The US isn’t allowed to torture.  The CIA isn’t allowed to invent lies to push the US government into wars because members of that organization are spies for a foreign government or are receiving financial gain.

Many members of the CIA and other intelligence agencies are actually foreign nationals and active member of foreign intelligence agencies whose goals are inconsistent with the welfare of the United States.  Reporting this can and will get an honest CIA agent imprisoned.  Yes, dozens of CIA agents are also agents of foreign intelligence agencies, some of whom are known to have been directly involved in terrorists acts including but not limited to planting car bombs, killing American soldiers with IEDs and helping orchestrate financial crimes inside the US.

Many more foreign nationals inside the US carry falsified identification and pretend to be FBI or CIA or TSA or Homeland Security or even your local police.  They harass journalists or operate as assassination teams.  John Wheeler III was killed by one such team.  The American governent knows who they are but refuses to arrest them.
YouTube – Veterans Today –

When people talk about disbanding the CIA and starting all over again, they aren’t talking through their hats.  We wish the current director, former General Petraeus, an oddly able person, luck with dealing with this problem.

He will do nothing.  He can’t afford being accused of anti-Semitism, which is the direct threat he is currently under.  He is very aware of this.

Congress demands that he never “clean house,” no matter how many in the CIA are disloyal to the United States.

What am I saying?  Simply put, there are serious inconsistencies between many Israeli policies and the broader welfare of the United States, yet Israeli citizens are, to a large extent, in official policy making positions as paid employees of US intelligence and security organizations.

These are the individuals responsible for much of what you read above, very real proof of foreknowledge of 9/11 and to many, a trail of suspicion, backed by increasing hard evidence, now a deluge, that “foreknowledge” was actually “full complicity.”

How can Kiriakou be arrested for reporting criminal acts, unless you consider the withdrawal from the ICC (International Criminal Court) by the US as protection from crimes committed by Americans on the sovereign territory of signatory nations.

From a legal standpoint, the arrest of Kiriakou is complicity after the fact in war crimes and warrants can be issued by any signatory nation against any authority involved, which, in this case, is the Central Intelligence Agency and the United States Department of Justice, their directors, legal staff and participating enforcement officers. This includes judges.  They will be unable to travel outside the US.

THE UNFOLLOWED TRAIL

Yesterday, Dr. Jim Fetzer and I talked for hours.  We talked much about the Kennedy killings and how TV shows try to depict the impossible act of shooting President Kennedy with a broken rifle through the middle of a tree in full bloom was beyond any imagination.

Real life demonstrations all failed, the last by Jesse Ventura.

TV stars do it all the time, on NCIS, on Bones, shots those of us who could shoot skeet with a pistol could never make.

What does this prove?  It tells me that the hopeless coverup of the murder of John and Robert Kennedy, tied to Vietnam, tied to Israeli nuclear weapons and tied to the infamous Federal Reserve System, is still an industry with backers who some would believe were “Hollywood liberals.”

We know them as traitors who still need to cover up a 50 year old crime, media powers that fictionalize history as they fictionalize our news.

LIGHT AT THE END OF THE TUNNEL

Many of the things covered by President Obama, not enough things I admit, but many, would restore confidence and some legality to federal authority that is, in all probability, totally absent now.

Current monies held by the Federal Reserve Bank of Richmond, ordered released recently, are sufficient to impact the US economy, cut unemployment by 40%  and reduce our national debt.

These monies, according to documents filed in federal court this week, have, with the tacit approval of the Chairman of the Federal Reserve and Treasury Department, been illegally used as collateral by major banks.

In 2007, a federal suit was filed to recover $4.3 trillion USD stolen by Goldmann Sachs, Morgan Stanley and others..  A settlement was reached and the monies are to be returned, we are told, but no agency is enforcing the orders of the court or even the orders signed by the president of the United States.

Billions of this money now officially belongs to non-profit corporations earmarked for aid to homeless veterans and other projects.

Some of the language of that lawsuit will be included in the exhibits below.

Please note:  Goldman Sachs went to the Bush administration, straight to Paulson who had secretly lent them, tax free and interest free, $4.5 trillion dollars, and asked for a federal “bail out.”

He authorized it, just as he had authorized the illegal loan of money that was never his to lend in the first place.

Goldman Sachs never carried this on their books nor any of the profits, estimated at over $15 trillion dollars.  It was all laundered overseas while American taxpayers covered imaginary losses engineered by our own Secretary of Treasury.

You have heard stories that the Federal Reserve has lend out, illegally, trillions to their friends.  What they don’t say is that this money wasn’t theirs but stolen from accounts under their trust.  They is why they could do it, depending on court and enforcement agencies to look the other way under Ashcroft, Gonzoles and now even the Obama administration though our curren president has personally intervened.

His signed orders are now being ignored as though he were some bum off the streets.   What does this tell you?

Here is another even more interesting part:

So, we have, nearly 6 years ago, proof that China transferred $4.5 trillion dollars to the US, part of a fund to be used to finance public projects and reduce national debt and build a nationwide high speed rail system which would employ 400,000 Americans.

In the interim, who has been using this money?

Current court estimates indicate the value with interest at $7.2 trillion dollars, half the entire national debt.

The real question, of course, is how many trillions of dollars of profit was made by the banks who were allowed to borrow this money at no interest, enough to finance hundreds, perhaps thousands of trillions of dollars in transactions and untold profit.

These same banks claimed they were broke and had to be bailed out by the US government, begging trillions while hiding the fact they had been given the free use of trillions in illegal wealth from China, funding now proven to belong to Ameritrust and designated for rebuilding America.

THE STORY

As President Obama mentioned in the video above, the American people are increasingly separating themselves from their government.  Washington is looked on as a den of inequity, the center of all that is wrong in the world, a heart even darker than Wall Street.

” What Do You Mean How Much is Enough!!! ”

As for “insider trading,” few know what it means.  Members of congress, not only profit from the companies they award government contracts to but are regularly awarded “stock options” which profit them billions, by authorizing the traditional “$600 toilet seat” times a million.

They wasted the future of America for their own enrichment, sucking the lifeblood of America and hiding behind illegal laws, crooked judges and a Justice Department that is required, we are told, to look the other way because congress is above any law.

As for Ameritrust and China, we find that members of the Bush regime personally authorized the lending an no interest of trillions of dollars of money that wasn’t theirs.

How were they repaid?  What we find, of course, is that the famous names of that period are investors and board members everywhere we look.

It has been a decade of thievery hidden behind the War on Terror, all done while American soldiers not only died, but were sent on missions to kidnap, torture and murder.

When those same soldiers returned, unprepared for anything but suicide, homelessness or murdering their own families, something that has happened more times than anyone could imagine,  the trillions in profits made off their destruction are too busy filling foreign bank accounts, those “Mitt Romney” accounts, to do any good.

When $2 billion is given to American veterans, they find it illegally lent to Goldman Sachs by former Treasury Secretary Paulson.  How do we get it back?  I have some ideas.

Editing:  Jim W. DeanDear Readers, A personal note.

If you have not caught on yet, a war is about to start. This huge grand larceny is just a beginning string to pull. In countries all over the world similar financial scams have been going on that have stolen more money and caused more suffering than a huge war.

Those that did this gave some of it away to charity and are feted as great citizens. And buying protection from prosecution, so far, has been pocket change for them.

To carry this through we are going to be calling on you to help. The bad guys know that if this gets started it could be all down hill for them. Ditto for many in Congress who have earned themselves life sentences.

These funds could have had a tremendous impact on blunting the worst part of the recession, but some very well known American figures and families put their own greed before the unneeded suffering of the American people. They have had little to no fear and they have bet that money rules. So we are going to find out if they are right, and so will you.

It’s time to choose sides folks. American has been betrayed by supposedly her best and her finest. It’s time for us to show them what we think of their efforts, and set an example. Let us know if you would like to help, because it is fix bayonets time.

If they get away with this, there is nothing that they will not do to us.

 

SOURCE: http://www.veteranstoday.com/2012/01/26/tidbits-what-is-being-held-back-from-you/

 

REPORTS: CIA & DEA Training ZETAs and Fueling Cartel War

REPORTS: CIA & DEA Training ZETAs and Fueling Cartel War

The Central Intelligence Agency was intimately involved with the federal government’s infamous “Operation Fast and Furious” scheme to send American weapons to Mexican drug cartels while simultaneously working with other agencies allowing narcotics to be shipped over the border, according to a series of explosive reports.

Citing an unnamed CIA source, a Washington Times article theorizes that U.S. officials were actively aiding organizations such as the Sinaloa cartel with guns and immunity in an effort to stymie Los Zetas. That’s because, according to the piece, the powerful and brutal criminal Zetas syndicate has the potential to overthrow the government of Mexico — and might be planning to do so.

Apparently the secretive U.S. intelligence agency also played a key role in creating and using the American government’s gun-running program to arm certain criminal organizations. The scheme, which has already been implicated in countless deaths including the murders of several U.S. and Mexican law enforcement officers, saw thousands of high-powered American guns delivered to multiple cartels.

“The CIA’s motive is clear enough: The U.S. government is afraid the Los Zetas drug cartel will mount a successful coup d’etat against the government of [Mexican President] Felipe Calderón,” wrote Robert Farago and Ralph Dixon in the Times’ report, entitled “Was CIA behind Operation Fast and Furious?”

According to the article, which also cites former CIA officials and even ex-Drug Enforcement Administration boss Phil Jordan, Los Zetas has already prepared to disrupt and possibly even subvert Mexico’s 2012 national election. Ironically, many leaders of the criminal empire supposedly threatening the existence of the Mexican government were actually trained in the U.S. at the infamous military training center known as School of the Americas.

“Founded by ex-Mexican special forces, the Zetas already control huge swaths of Mexican territory,” Farago and Dixon noted. “They have the organization, arms and money needed to take over the entire country … There’s a very real chance the Zetas cartel could subvert the political process completely, as it has throughout the regions it controls.”

As The New American reported last week, federal court filings by a top Sinaloa Cartel operative shed even more insight on what may have been going on. And the documents would appear to lend some credence to the Times’ article.

The accused “logistical coordinator” for the Sinaloa organization, Jesus Vicente “El Vicentillo” Zambada-Niebla, claimed that he had an agreement with top American officials. In exchange for information on rival cartels, the deal supposedly gave him and his associates immunity to import multi-ton quantities of drugs across the border.

“Indeed, United States government agents aided the leaders of the Sinaloa Cartel,” the court filing states. Countless guns — via Operation Fast and Furious — also flowed to the cartel under the arrangement, according to Zambada-Niebla and U.S. officials.

But there might be even more to the story than this. Other former U.S. agents have claimed that Los Zetas is controlled and abetted by the American government, too. “There’s warehouses down here [in Texas] where they’re training more Zetas individuals that work for the cartels,” former DEA operative and whistleblower Celerino Castillo said during a radio interview with Alex Jones.

And a separate report late last month based on allegations by CIA and DEA insider Phil Jordan is even more explosive. He is claiming that the Obama administration was selling Los Zetas military-grade weaponry through a front company set up in Mexico.

“They’ve found anti-aircraft weapons and hand grenades from the Vietnam War era,” former CIA pilot Robert “Tosh” Plumlee, who supported Jordan’s claims, told the El Paso Times.

Even members of the Zetas have confirmed the allegations, as The New American reported last month. One of the cartel’s founders, Jesús “El Mamito” Aguilar, told Mexican police in a taped interrogation released to the public that his organization was getting weapons directly from the U.S. government.

New revelations also indicate that American taxpayers were even financing the cartels’ arms acquisitions through multiple federal agencies. And available evidence shows that approval for the programs reached into the highest levels of the Justice Department and other parts of the Obama administration.

The Bureau of Alcohol, Tobacco, Firearms and Explosives (still known as ATF) officially claimed that “Fast and Furious” was an effort to track guns and arrest higher-ups involved in Mexico’s criminal underworld. But after the scheme was publicly exposed, countless analysts and whistleblowers questioned that excuse.

Many speculated that it may have been a plot to demonize the Second Amendment and impose further restrictions on the rights of law-abiding Americans. Indeed, the process is already well underway — and gun violence in Mexico has been used for years as a primary justification.

But this new twist in the story adds another, even more troubling dimension to the whole plot. The Washington Times claimed that, in an effort to stop a Zetas takeover of Mexico, “Uncle Sam has gotten into bed with the rival Sinaloa cartel, which has close ties to the Mexican military.” According to the article, the Obama administration was essentially taking sides to help keep the Calderón regime in power at any cost.

But if the U.S. government is also coddling and helping the Zetas, that theory cannot be entirely accurate. As more information continues to surface, the questions are growing in number and importance.

In the past, the CIA has been implicated in numerous scandals involving drug and weapons trafficking. From Vietnam and Iran to Latin America, the agency has repeatedly been caught importing narcotics and exporting arms for shadowy and subversive purposes.

Whether segments of the CIA were definitively involved in Mexico’s mayhem remains to be seen. A former DEA agent cited by Narco News raised that possibility last month, but said if the agency was indeed behind the plot, evidence would almost certainly be sealed under the guise of “national security.”

For now, the New York Times reported on August 6 that the Obama administration was sending more CIA operatives to the troubled nation of Mexico. Congress is also currently investigating some elements of the administration’s ever-expanding gun-running scandal.

But as the Washington Times’ piece and various analysts have suggested, it might be time to appoint a special prosecutor and hold officials linked to the chaos and criminality responsible in a court of law. Otherwise, the whole truth may never be known.

 

SOURCE: http://www.thenewamerican.com/world-mainmenu-26/north-america-mainmenu-36/8599-reports-cia-working-with-mexican-drug-cartels

FALSE FLAG: The FBI Yet Again, Thwarts its Own Terror Plot

FALSE FLAG: The FBI Yet Again, Thwarts its Own Terror Plot

The FBI has received substantial criticism over the past decade — much of it valid — but nobody can deny its record of excellence in thwarting its own Terrorist plots.  Time and again, the FBI concocts a Terrorist attack, infiltrates Muslim communities in order to find recruits, persuades them to perpetrate the attack, supplies them with the money, weapons and know-how they need to carry it out — only to heroically jump in at the last moment, arrest the would-be perpetrators whom the FBI converted, and save a grateful nation from the plot manufactured by the FBI.

Last year, the FBI subjected 19-year-old Somali-American Mohamed Osman Mohamud to months of encouragement, support and money and convinced him to detonate a bomb at a crowded Christmas event in Portland, Oregon, only to arrest him at the last moment and then issue a Press Release boasting of its success.  In late 2009, the FBI persuaded and enabled Hosam Maher Husein Smadi, a 19-year old Jordanian citizen, to place a fake bomb at a Dallas skyscraper and separately convinced Farooque Ahmed, a 34-year-old naturalized American citizen born in Pakistan, to bomb the Washington Metro.  And now, the FBI has yet again saved us all from its own Terrorist plot by arresting 26-year-old American citizen Rezwan Ferdaus after having spent months providing him with the plans and materials to attack the Pentagon, American troops in Iraq, and possibly the Capitol Building using “remote-controlled” model airplanes carrying explosives.

None of these cases entail the FBI’s learning of an actual plot and then infiltrating it to stop it.  They all involve the FBI’s purposely seeking out Muslims (typically young and impressionable ones) whom they think harbor animosity toward the U.S. and who therefore can be induced to launch an attack despite having never taken even a single step toward doing so before the FBI targeted them.  Each time the FBI announces it has disrupted its own plot, press coverage is predictably hysterical (new Homegrown Terrorist caught!), fear levels predictably rise, and new security measures are often implemented in response (the FBI’s Terror plot aimed at the D.C. Metro, for instance, led to the Metro Police announcing a new policy of random searches of passengers’ bags).   I have several observations and questions about these matters:

(1) The bulk of this latest FBI plot entailed attacks on military targets: the Pentagon, U.S. troops in Iraq, and possibly military bases.  The U.S. is — as it has continuously announced to the world — a Nation at War.  The Pentagon is the military headquarters for this war, and its troops abroad are the soldiers fighting it.  In what conceivable sense can attacks on those purely military and war targets be labeled “Terrorism” or even illegitimate?  The U.S. has continuously attacked exactly those kinds of targets in multiple nations around the world; it expressly tried to kill Saddam and Gadaffi in the wars against their countries (it even knowingly blew up an entire suburban apartment building to get Saddam, who wasn’t actually there).   What possible definition of “Terrorism” excludes those attacks by the U.S. while including this proposed one on the Pentagon and other military targets (or, for that matter, Nidal Hasan’s attack on Fort Hood where soldiers deploy to war zones)?

(2) With regard to the targeted building that is not purely a military target — the Capitol Building — is that a legitimate war target under the radically broad standards the U.S. and its allies have promulgated for itself?  The American “shock and awe” assault on Baghdad destroyed “several government buildings and palaces built by Saddam Hussein”; on just the third day of that war, “U.S. bombs turn[ed] key government buildings in Baghdad into rubble.”  In Libya, NATO repeatedly bombed non-military government buildings.  In Gaza, Israeli war planes targeted a police station filled with police recruits on the stated theory that a valid target “ranges from the strictly military institutions and includes the political institutions that provide the logistical funding and human resources” to Hamas.

Obviously, there is a wide range of views regarding the justifiability of each war, but isn’t the U.S. Congress — which funds, oversees, and regulates America’s wars — a legitimate war target under the (inadvisedly) broad definitions the U.S. and its allies have imposed when attacking others?  If the political leaders and even functionaries of other countries with which the U.S. is at war are legitimate targets, then doesn’t that necessarily mean that Pentagon officials and, arguably, those in the Congress are as well?

(3) The irony that this plot featured “remote-controlled aircraft filled with plastic explosives” is too glaring to merit comment; the only question worth asking is whether the U.S. Government can sue Ferdaus for infringing its drone patents.  Glaring though that irony is, there is no shortage of expressions of disgust today, pondering what kind of Terrorist monster does it take to want to attack buildings with remote-controlled mini-aircraft.

(4) Wouldn’t the FBI’s resources be better spent on detecting and breaking up actual Terrorist plots — if there are any — rather than manufacturing ones so that they can stop those?  Harboring hatred for the U.S. and wanting to harm it (or any country) is not actually a crime; at most, it’s a Thought Crime.  It doesn’t become a crime until steps are taken to attempt to transform that desire into reality.  There are millions and millions of people who at some point harbor a desire to impose violent harm on others who never do so: perhaps that’s true of a majority of human beings.  Many of them will never act in the absence of the type of highly sophisticated, expert push of which the FBI is uniquely capable.  Is manufacturing criminals — as opposed to finding and stopping actual criminals — really a prudent law enforcement activity?

(5) Does the FBI devote any comparable resources to infiltrating non-Muslim communities in order to persuade and induce those extremists to become Terrorists so that they can arrest them?  Are they out in the anti-abortion world, or the world of radical Christianity, or right-wing anti-government radicals, trying to recruit them into manufactured Terrorist plots?

(6) As usual, most media coverage of the FBI’s plots is as uncritical as it is sensationalistic.  The first paragraph of The New York Times article on this story described the plot as one “to blow up the Pentagon and the United States Capitol.”  But the FBI’s charging Affidavit (reproduced below) makes clear that Ferdaus’ plan was to send a single model airplane (at most 1/10 the size of an actual U.S. jet) to the Capitol and two of them to the Pentagon, each packed with “5 pounds” of explosives (para. 70); the Capitol was to be attacked at its dome for “psychological effect” (para 34).  The U.S. routinely drops 500-pound or 1,000-pound bombs from actual fighter jets; this plot — even if it were carried out by someone other than a hapless loner with no experience and it worked perfectly — could not remotely “blow up” the Pentagon or the Capitol.

(7) As is now found in almost every case of would-be Terrorist plots against the U.S. — especially “homegrown Terrorists” — the motive is unbridled fury over (and a desire to avenge) contintuous U.S violence against Muslim civilians.  Infused throughout the charging Affidavit here are such references to Ferdaus’ motives, including his happiness over the prospect of killing U.S. troops in Iraq; his proclamation that he’s “interested in traveling to Afghanistan” to aid insurgents; his statement that “he wanted to ‘decapitate’ the U.S. government’s ‘military center’ and to severely disrupt . . . the head and heart of the snake” (para 12) and to “essentially decapitate the entire empire” (para 34) (compare that language to how the U.S. described what it tried to do in Baghdad).  At least according to the FBI, this is how Feradus replied when expressly asked why he wanted to attack the U.S.:

Cause that would be a huge scare . . . the point is you want to scare them so they know not to mess with you . . . They have . . . . have killed from us, our innocents, our men, women and children, they are all enemies (para 19).

If the FBI’s allegations are accurate, then it’s clear Ferdaus has become hardened in his hatred; he talks about a willingness to kill American civilians because they have become part of the enemy, and claims that he fantasized about such attacks before the FBI informant spoke to him.

But whatever else is true,  it’s simply unrealistic in the extreme to expect to run around for a full decade screaming WE ARE AT WAR!! — and dropping bombs and attacking with drones and shooting up families in multiple Muslim countries (and occupying, interfering in and killing large numbers before that) – and not produce many Rezwan Ferdauses.  In fact, the only surprising thing is that these seem to be so few of them actually willing and able to attack back that — in order to justify this Endless War on civil liberties (and Terror)  — the FBI has to search for ones they can recruit, convince, and direct to carry out plots.

Complaint Affidavit

Close

Glenn Greenwald
Follow Glenn Greenwald on Twitter: @ggreenwaldMore Glenn Greenwald

SOURCE: http://www.salon.com/2011/09/29/fbi_terror/

Food Activists Now Labeled Terrorists by FBI

Food Activists Now Labeled Terrorists by FBI

(NaturalNews) The National Defense Authorization Act (NDAA) — an act which allows for the government of the United States to indefinitely imprison citizens without any access to due process — has been signed in accordance with a Congress that represents Corporate America and Big Agriculture, but not “we the people”. So now we should all consider that the FBI has nothing better to do than seek food activists as terrorists among the other activists deemed domestic terrorists.

The FBI investigated a former Chicago Tribune journalist for handing out leaflets advocating animal rights. Will Potter was arrested by Chicago police and then released. Shortly after, the FBI knocked on his door. Will was threatened with being placed on the “domestic terrorist list.”

More journalist than street activist, Will decided to dive into the rabbit hole of federal law enforcement suppressing environmental and animal rights activists. From that experience he wrote his book Green is the New Red: An Insider’s Account of a Social Movement Under Siege. What will discloses is disturbing.

Eco-terrorists, animal rights terrorists, and political prison

The war against terrorism already includes environmentalists and animal rights groups. Both groups occasionally engage in acts of vandalism, temporary occupation, and “illegally” releasing animals from lab experiment facilities.

But usually these activists conduct peaceful demonstrations and disseminate materials promoting their valid causes. If there is any vandalism, one could be charged for that and either fined or jailed according to the offense and the accused person’s previous record.

But now, two secret prisons designed for domestic terrorists have sprung up in Indiana and Illinois. And environmental and animal rights activists have been considered domestic terrorists for years. These special domestic terrorist prisons are called Communication Management Units (CMUs).

Per prison documentation, CMUs are “self-contained” housing units for prisoners who “require increased monitoring of communication” in order to “protect the public.” Current prisoners were transferred from minimal security prisons to CMUs without notice or due process.

The CMUs limit phone calls, visiting time, and mail much more than even maximum security prisons. Everything is monitored closely. Another Prison Bureau mission statement for CMUs is to keep people with “inspirational significance” from communicating with their groups or anyone in the media and public.

And now food activists are eligible for CMUs

This covers a wide spectrum of peaceful activists. Documents retrieved under the Freedom of Information Act (FIA) disclose the FBI’s intent to infiltrate food activist groups and arrest food activists as domestic terrorists.

There have been raids on the Food Not Bombs activist groups. Their activity has involved creating vegetarian buffet food stands in public parks to feed the homeless, protest marches, and investigating and communicating corrupt global food distribution. That’s a hot one!

Recently, public park feeding festivals were closed down forcefully. Members are often under surveillance. As early as 1989, military run classes in domestic training used the Food Not Bombs group as a case-study for one of “America’s most hardcore terrorist groups”.

Most of us know of other raids on raw milk distributors, family farms, private vegetable gardens and private food storage facilities. An outdoor vegetarian banquet held at someone’s ranch was even disrupted by state health officials recently.

All of these cases of local law enforcement or food agency harassment eventually make their way into FBI files. But there’s more — the FBI has urged local authorities to harass and provide information. A Food Not Bombs site reports that private security agents from large corporations, like Monsanto, are also involved with food activist surveillance and monitoring.

The “War on Terror” is the cover for all this intimidation of citizens actively concerned about the future of food quality and food freedom. A compliant media and dumbed down population allows it. (http://www.naturalnews.com/034538_N…)

History of FBI Wiretapping & Telecommunications Spying

History of FBI Wiretapping & Telecommunications Spying

Courtesy of Cryptome’s link distribution, we get a glimpse into the mind of 1952 (an era when crypto on land lines was very limited, indeed). We get to see how the US tapped and how it worked with the phone company to tap others – in the course of determining that standard US techniques for taps were not present (2-wire pair line tampering, inductive tapping of the 2-wire pair on local telephone pole, tapping of the “multiplying line” extensions).

Let’s not  forget jus “how physical” was telephony, in 1952.

image

image

image

 

We also get to see the reaction to (activated) resonant cavity class of listening device – distinct from tapping lines.

image

 

One sees the resource requirements, and the basic attack plan for the new threat (and the desire not to alert the tapper, presumably so the tap could be turned to dis-information).

image

One notes that searchers were familiar with microphony attacks in general, though not the cavity resonant devices initially.

image

Earlier disclosures show that the high level FBI agent had two classes of phone – those served by the phone company and those installed by DoD (obvious from the context of the redacted material). This shows that, in the 1950s, FBI was very much sub-servient to DoD in technical countermeasures.

image

At the same time, we note how the FBI was viewed as a go-to agency, by others (not that there is any suggestion that there is a law enforcement rationale to such requests).

image

The USPS (as a giant spying agency on paper) was probably one source, and one notes how the agencies were colluding to track EACH cabinet officer (of the government) for oral cues (as to the souce of leaks about USPS policies). This all seems consistent with the general state of red-scare paranoia of the period, as folks sought to address technical information leakage on the bomb, etc. Note that its all very much a pretext (to get the FBI into the “business”), since its all about the club of executives (not line sources).

One sees also other civilian issues, including Bensons’ solid understanding of the price sensitivity (which seems a bit more coherent, and more tuned to issues of today):

image

Its fun to see the “most likely” sources of placement:

image

 

One sees some of the normal “art” of the searcher, used to American equipment:-

image

 

One notes a couple of references to the “countermeasure” device (which could be DoD/FBI trojan horse, of course):

image

 

An outline of its purposes follows (basically, it isolates the mic in the handset, or suppresses it own diaphragm)

image

 

One sees a side threat, too, repurposing lines:

image

 

An interesting tit bit about the secret service wanting to do their own scan, and the FBI a sole source of the equipment (which was hand made, which is telling about FBI’s “Lab Division” technical capabilities in presumably valve electronics of the day).

image

 

At the same time, evidently there is a standard design (such that it can now be ”procured”).

image

 

One see several features of a general foil, since folks rationalize that its more important to protect the channel that to prevent leaks. They really WANT to use it for reverse signaling, consistent with 1945 counter-intelligence doctrine. There is also the assumption that the Presidents Office and Cabinet Office are really not secure areas (since the cabinet officers are necessarily surveilled proto-suspects, themselves).

One has to assume that non-FBI folks would also be testing FBI capabilities (since Hoover was such a known-deceiver). One sees how FBI is entirely compartmentalized from nuclear-level infosec/comsec (which must have irked Hoover no end).

 

One sees another reference to the infamous “British” equipment (which somewhat undermines the story about FBI being the sole-source of cavity mic detecting). Who operates the latter equipment is not disclosed.

image

 

we see a policy of information containment, concerning technical methods (including “acceptance” that white house could be a source of insecurity – national imperatives notwithstanding)

 

image

We see clearly how the FBI and the phone companies happily conspire to mis-inform and mid-direct the White house officials (in the hope that direct White House request be made of FBI, for an appropriate investigation, supported by technical means). It is  more important to the FBI to protect this than protect the secrets being leaked!

One sees how Bell Labs is involved in subverting the signalling system, to aid tracing (suggesting that such tracing was not present, pre 1952). Having a secretary listen in to the call (and write it all up, soviet style, was deemed much more appropriate, as in White House conventions):

 

image

 

we also seem by 55, the emergence of ISIS, led by Treasury:

image

By 1955, one sees less scare about the cavity mic, and more action about compartmentalizing the Community buildings’s lines.

 

image

Folks are still obviously worried that the very proximity to the wire pairs afforded soviet tapping, of calls to friendly governments. One sees nothing about radio tapping though (where folks had the most skill.)

 

We also see some of the phone company responses emerging:

image

 

And, in other quotes we see the general attitude towards GSA, with phone companies wanting not to participate with GSA ‘infosec’ policies (preferring cosy relations with FBI, instead, with whom they have a working relation regarding authorized wire taps, anyways).

 

We see how transistors have made their mark (on size), by 1956:

image

One sees s little of the architectural impact on the FBIs own buildings (with reference to tie lines, etc) and “mainframe” switching:

image

 

one sees countermeasure, in 1957, to (presumably) analogue signalling for video (though we  recall, they had PCM in 1942. By 1957, did they have early codecs for video?)

image

we see a general fishing attempt against the c ontractors of state (where FBI has no jurisdiction) – seeking to perform an intelligence review:

image

We see the “former agent” network subverting agency policies, with “discreet checks”, being “caused”. Cooperating with such subversion seems not to be a worry for the FBI. even absent any rationale for an “investigation”. Its just normal to engage in this type of behaviour.

image

 

One sees an interesting fact about 1945:

image

 

One sees means used to isolate those who would be independent of the FBI’s technical expertise (in wire circuits, and sound recording):

image

 

one sees the mindset of the FBI, concerning microphony (and countermeasures):

image

 

All the drivel about inspecting handsets for “tampering” is a diversion, to the microphones outside the windows measuring the window’s reactance itself! There is a fair amount of policy-based deception going on.

When you look at the endless letters, one sees folks in “power” looking for assurance that someone makes them believe that a) their equipment is not being tampered with, and (b) they indeed have something worth keeping a secret (given how important, they now are).

one sees in a 1962 memo emergence of secure phone codecs (keyed by card), with attendant overhead of security officers responsible for the keying.

 

image

Interesting facts on capabilities, costs, leased line specificity and delay:

image

http://jproc.ca/crypto/ky3.html

Someone helped the FBI out, on using window material to project sound:

image

 

Updating to 1981,

image

Updating to 1988, we see quite a marked change in the tone. There is a lot more professionalism on display, particularly once FBI formally ceded from DIA in handling the industrial security program. Upto 1995,

image

 

SOURCE

Organic Food Provider Raided In Yet Another Illegal & Unconstitutional ‘Bust’

Health department tyrants raid local ‘farm to fork’ picnic dinner, orders all food to be destroyed with bleach

(NaturalNews) It is the latest case of extreme government food tyranny, and one that is sure to have you reeling in anger and disgust. Health department officials recently conducted a raid of Quail Hollow Farm, an organic community supported agriculture (CSA) farm in southern Nevada, during its special “farm to fork” picnic dinner put on for guests — and the agent who arrived on the scene ordered that all the fresh, local produce and pasture-based meat that was intended for the meal be destroyed with bleach.

For about five years now, Quail Hollow Farm has been growing organic produce and raising healthy, pasture-based animals which it provides to members as part of a CSA program. And it recently held its first annual “Farm to Fork Dinner Event,” which offered guests an opportunity to tour the farm, meet those responsible for growing and raising the food, and of course partake in sharing a meal composed of the delicious bounty with others.

But when the Southern Nevada Health District (SNHD) got word of the event and decided to get involved, this simple gathering of friends and neighbors around a giant, family-style picnic table quickly became a convenient target for the heavy hand of an out-of-control government agency. And Monte and Laura Bledsoe, the owners and operators of Quail Hollow Farm, were unprepared for what would happen next.

SNHD official Mary Oaks raids picnic without cause or warrant, orders destruction of dinner food
Laura Bledsoe explains in a letter to her guests written after the fact that two days prior to the event, SNHD contacted the farm to say that, because the picnic was technically a “public” event, the couple would have to obtain a “special use permit,” or else face a very steep fine. Not wanting to risk having the event disrupted, the Bledsoes agreed to jump through all the demanded legal hoops even though their gathering was really just a backyard picnic. (more…)

’40,000 violations of the law’ in FBI snooping: report

Companies ‘all too willing’ to comply with FBI requests for personal information, EFF says

As the US prepares once again to extend the Patriot Act, a new report from a privacy watchdog indicates that the FBI’s use of the law and other surveillance powers may have led to as many as 40,000 violations of the law by the bureau in the years since 9/11.

According to documents obtained by the Electronic Frontier Foundation, from 2001 to 2008 the FBI reported nearly 800 violations of surveillance law and the Constitution to the Intelligence Oversight Board, a civilian monitoring group that reports to the president.

The EFF also determined that the FBI investigated some 7,000 potential violations of the law that occurred during surveillance operations. The group estimated that, based on the rate of reporting of violations, the FBI may have violated the law as many as 40,000 times during investigations since 9/11.

“The documents suggest the FBI’s intelligence investigations have compromised the civil liberties of American citizens far more frequently, and to a greater extent, than was previously assumed,” the EFF stated in its report.

(more…)