Feeds:
Posts
Comments

Posts Tagged ‘Central Intelligence Agency’


NYT–The chairwoman of the Senate intelligence committee on Tuesday accused the Central Intelligence Agency of improperly removing documents from computers that committee staff members had been using to complete a report on the agency’s detention program, saying the move was part of an effort to intimidate the committee.

13089388194_c96e582926_b12478672155_e412cb1453_b

Feinstein is showing her stripes

She’s one of those tyranny types

With swastika crotch

Big Sis likes to watch

And ALL information she swipes

The Limerick King

Read Full Post »


The De Tocqueville Memorandum

“America is great because America is good, and if America ever ceases to be good, America ceases to be great.”

Philosophers tell us that we can reason backwards from our behavior to our First Principles to determine what guides us.

In this memorandum I seek to prove that the behavior of the United States government in the modern era can best be described as being ruled by Pure Evil and that the governing class in America seeks wherever possible to do the greatest harm to the greatest number of people. And I further intend to prove that this harm is in this present generation focused as much on the American people as it is on foreign nationals. Though I do grant that people overseas have cause for complaint.

America was founded upon the belief in life, liberty and the pursuit of happiness. Today life is not cherished, liberty is denied and happiness will soon be unattainable.

I will follow the popular trend and offer a list of ten reasons why I believe America is being ruled by men dedicated to the propagation of Evil.

1) America has used Depleted Uranium weapons in combat since 1991. DU weapons have been discovered in test firing ranges from Hawaii to Puerto Rico. Dick Cheney according to Leuren Moret used to get reports daily on DU air sample levels from Iraq. He ordered DU bombs to be dropped in or near towns like Fallujah if their radiation levels dropped too low.

The above photo is of a foreign baby born in Iraq after the occupation. The image below is from the son of an American who served in Iraq. This American child was likely damaged by the presence of DU in his father’s body. The US House and Senate since 1991 has done nothing to stop the use of DU despite the obvious dangers to Americans who serve in the military and their families or to people living near firing ranges.

2) The United States is funding Al Qaeda. In fact Al Qaeda or the base was never anything but a database or list of Arabs willing to work for America and Great Britain. Zbigniew Brzezinski used Al Qaeda to entice the Soviet Union into invading Afghanistan. That policy led to the deaths of more than 4 million Afghans. Mass murder is just one foundation of America’s foreign policy.

Currently, the US is funding Al Qaeda which is torturing and killing Syrians. American taxpayers are paying mercenaries to behead Christians and to gouge out their eyes. They are destroying Christian churches which were founded as far back as 50 A.D. Yet the threat of our Al Qaeda mercenaries is ostensibly why TSA has the right to grope the genitals of airline passengers. The real reason is to acclimate Americans to a future where the police have the right to sexually assault you and your children, to  torture you and  to kill you.

3) Whenever the American government needs to justify the violation of the Bill of Rights or the commission of an atrocity, mention is made of 911. BBC went on air 22 minutes before the collapse of WTC Tower 7 on 911 to announce that it had already fallen down. The Rothschild owned Reuters news agency had told BBC that WTC 7 had collapsed before it did. Tower 7 was not hit by an airplane. The BBC mentioned debris from Towers 1 and 2. But look at this brief video of the collapse. There is no visible debris damage. This building was obviously taken down by a controlled demolition. The video  below would have compelled a nation that had not been occupied by a foreign power to arrest everyone who allowed this atrocity to happen.

4) I mentioned America as being occupied by a foreign power. Some trace the occupation of America to 11-22-1963 and the assassination of President Kennedy. The Occupied media went on air that day and said that the President had been shot by a lone assassin firing from the Texas School Book Depository behind the motorcade. The best Marine Corps snipers from the Vietnam war tried at Quantico to re-create the assassination as dictated by the Warren Commission. Those Marine Corps snipers could not make the fatal shots even with superior weapons. Dan Rather went on CBS radio and described to the radio audience what he saw from the Zapruder film. He said clearly the President’s head was being forced forward by the impact of bullets from behind him. Life magazine took photos of the assassination in the order of 1-2-3 and published them on their cover in the order 3-2-1 so they could convince the people that there was no conspiracy and no coup.

If Mordecai Vanunu were allowed out of Israel, we could have a video of his declaration that Israeli Prime Minister David Ben Gurion order the assassination of JFK because the American President opposed Israel’s acquisition of nuclear weapons. The widespread nature of this conspiracy is easily proven by the following JFK Secret Service stand down video below.

5) Others trace the occupation of America to November 22, 1910 which was the date of the first meeting to draft the legislation that became the Federal Reserve Act. Under America’s banking system the commoners are charged interest on money the banks created out of nothing. This transfers wealth from small businesses, farmers and workers to the Bankers. Under fractional reserve banking every dollar in deposits allows the banker to loan out 10 ten dollars at interest. Please note the Banker is only paying interest on one dollar but is collecting on ten. This interest rate gouging leads to mountains of Unpayable Debts which in turn causes Depressions.

A Depression is a time in history when Unpayable Debts are cancelled. There are three ways to cancel debts. One is Hyperinflation as in the Weimar Republic. This leads to mass starvation and to war. The second is to foreclose on farms and home mortgages and to declare bankruptcy defaulting on debts. This led to the death by starvation of 3 million Americans during the 1930s and to WW II which killed 58 million human beings for no good reason.

There is a third way out of a Depression. The Babylonians canceled Unpayable Debts by law and recovered economically without suffering either mass starvation or war. But that method is unknown to anyone who attends American schools or listens to U.S. media. That is why I have concluded that America has both a Banker Occupied Government and Media.

6) After World War II, General Eisenhower had his troops set barbed wire up around open fields. He placed more than a million Germans into the camps and starved them to death with no protection against rain, snow and cold. Most of these men were soldiers but some were not. General Eisenhower was of Jewish descent.

7) At Yalta in March of 1945, Roosevelt, Churchill and Stalin who were all of Jewish descent agreed to forcibly repatriate Soviet Gentiles back to Russia where they were to be treated as traitors. Millions of these people were forced laborers who had been taken prisoner by the Germans. Captured Jews were in the concentration camps with the Gentiles. Auschwitz turned Silesian coal into gasoline using a Russian formula patented in 1915. Dachau had a satellite camp inside a mountain that made V2 rockers used to bomb London. The Jewish concentration camp inmates were permitted to go to Israel where they were given weapons and embarked on a genocidal ethnic cleansing program of the Palestinians which has continued to this day.

I remember reading an op-ed in the Wall Street Journal decades ago in which an American veteran wrote about the FOIA documents he received in which the US admitted to turning over 4 1/2 million refugees to the Soviets. One was a Russian who had served in the resistance to Franco and later joined the American Army as a sergeant and fought in North Africa and Italy. He was turned over to the Russians in Austria. American soldiers witnessed mass hangings of refugees they had turned over to the Russians in Germany.

I think this sufficiently demonstrates the Evil Nature of America’s Banker Occupied government. But let us continue as we would like to see what Destiny they have planned for us.

8) Societies can be measured by their ability to protect children from harm. America’s Banker Occupied Government (BOG) has dedicated itself to harming our children to the point of birth defects and even death. The Monsanto corporation has been allowed to produce Genetically Modified Organisms for human consumption. Tests of lab animals have shown that by the third generation the mice are either dear or sterile runts with multiple birth defects or dead. The great harm done to test subjects by GMO did not manifest before 120 days when adult mice began exhibiting tumors relatively large in size to their tiny bodies.

The Banker Occupied Government of the United States (BOGUS) allowed Monsanto to cut off their animal tests of GMO food after 90 days so lawmakers and the administration could deny the poisonous nature of our food. Any society that is willing to allow an Occupying Power to exterminate its children is cowardly. It goes without saying that the Occupying Power is Evil.

9) In 2001 BOG paid $75 million to Epicyte corporation as part of a campaign to sterilize adults and young children. Epicyte  corporation of San Diego spliced a protein from infertile Mexican women into corn. This technology was sold to Monsanto and DuPont and could also have been spliced into wheat, soy, rice or any other GMO crop. These international corporations have run amuck and have even spliced the genes of a spider into salmon. They have said they will release this into the wild without any study as Monsanto’s lawyer said it would be safe. The President of Epicyte in 2001 was Matt Hein who was Jewish. The sole reasoning behind splicing the Epicyte gene into our food supply is to carry out Henry Kissinger’s National Security Memorandum 200 of 1975. Henry Kissinger is Jewish and a wanted War Criminal. He has been described as a child molester in the Italian press.

10) 100,000 people a year worldwide die from heroin overdoses. The average age of a first time heroin user in the United States is 14. American taxpayers at great expense invaded and occupied Afghanistan. They also funded Global Hawk drones which are pilot-less versions of the U2 spy plane. Newer versions have compartments which permits BOG’s operatives to fly up to 3,400 pounds (1,542 kilograms) at a time around the world. This has led to an increase in drug purity and overdose deaths. The CIA, which is a primary subsidiary of BOG, flies cocaine and heroin into the US which it distributes to drug gangs along with weapons. This has unleashed a wave of violent crime in the homeland. There are 1.4 million drug gang members in the US.

This distribution of illegal drugs to enrich the ruling class was a fundamental feature of His Majesty’s Jewish Government which fought two opium wars against China in the 19th century. America has also fought two opium wars. The first was Vietnam and the second was Afghanistan. The Bankers launder a trillion dollars a year in illegal drugs and weapons. They also launder $500 billion a year in bribes so the commoners can never get what they need from their politicians.

Any government that sells heroin and guns to children in hopes of unleashing a crime wave against its law abiding citizens in order to make money is by definition Evil.

I think I have proven my point about the Evil Nature of those men who run the government of the United States. I have written elsewhere of Wall Street’s plans to ignite a Race War as soon as this current Depression hits us with full force. Millions of Americans and perhaps half a billion people overseas will die from starvation. At that point, BOG will release a series of plagues to cull the herd of a few billion commoners.

Anyone whether they be a billionaire or a worker or a soldier who does the bidding of this government is insane and could be prosecuted for War Crimes if we survive the plans of the Evil Ones.

Emergency Essentials/BePrepared

Read Full Post »


500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent

No matter which government conducts mass surveillance, they also do it to crush dissent, and then give a false rationale for why they’re doing it.

For example, the U.S. Supreme Court noted in Stanford v. Texas (1965):

While the Fourth Amendment [of the U.S. Constitution] was most immediately the product of contemporary revulsion against a regime of writs of assistance, its roots go far deeper. Its adoption in the Constitution of this new Nation reflected the culmination in England a few years earlier of a struggle against oppression which had endured for centuries. The story of that struggle has been fully chronicled in the pages of this Court’s reports, and it would be a needless exercise in pedantry to review again the detailed history of the use of general warrants as instruments of oppression from the time of the Tudors, through the Star Chamber, the Long Parliament, the Restoration, and beyond.

 

What is significant to note is that this history is largely a history of conflict between the Crown and the press. It was in enforcing the laws licensing the publication of literature and, later, in prosecutions for seditious libel, that general warrants were systematically used in the sixteenth, seventeenth, and eighteenth centuries. In Tudor England, officers of the Crown were given roving commissions to search where they pleased in order to suppress and destroy the literature of dissent, both Catholic and Puritan. In later years, warrants were sometimes more specific in content, but they typically authorized of all persons connected of the premises of all persons connected with the publication of a particular libel, or the arrest and seizure of all the papers of a named person thought to be connected with a libel.

By “libel”, the court is referring to a critique of the British government  which the King or his ministers didn’t like … they would label such criticism “libel” and then seize all of the author’s papers.

The Supreme Court provided interesting historical details in the case of Marcus v. Search Warrant (1961):

The use by government of the power of search and seizure as an adjunct to a system for the suppression of objectionable publications … was a principal instrument for the enforcement of the Tudor licensing system. The Stationers’ Company was incorporated in 1557 to help implement that system, and was empowered

 

“to make search whenever it shall please them in any place, shop, house, chamber, or building or any printer, binder or bookseller whatever within our kingdom of England or the dominions of the same of or for any books or things printed, or to be printed, and to seize, take hold, burn, or turn to the proper use of the aforesaid community, all and several those books and things which are or shall be printed contrary to the form of any statute, act, or proclamation, made or to be made. . . .

 

An order of counsel confirmed and expanded the Company’s power in 1566,  and the Star Chamber reaffirmed it in 1586 by a decree

 

“That it shall be lawful for the wardens of the said Company for the time being or any two of the said Company thereto deputed by the said wardens, to make search in all workhouses, shops, warehouses of printers, booksellers, bookbinders, or where they shall have reasonable cause of suspicion, and all books [etc.] . . . contrary to . . . these present ordinances to stay and take to her Majesty’s use. . . . ”

 

Books thus seized were taken to Stationers’ Hall where they were inspected by ecclesiastical officers, who decided whether they should be burnt. These powers were exercised under the Tudor censorship to suppress both Catholic and Puritan dissenting literature.

 

Each succeeding regime during turbulent Seventeenth Century England used the search and seizure power to suppress publications. James I commissioned the ecclesiastical judges comprising the Court of High Commission

 

“to enquire and search for . . . all heretical, schismatical and seditious books, libels, and writings, and all other books, pamphlets and portraitures offensive to the state or set forth without sufficient and lawful authority in that behalf, . . . and the same books [etc.] and their printing presses themselves likewise to seize and so to order and dispose of them . . . as they may not after serve or be employed for any such unlawful use. . . .”

 

The Star Chamber decree of 1637, reenacting the requirement that all books be licensed, continued the broad powers of the Stationers’ Company to enforce the licensing laws.  During the political overturn of the 1640′s, Parliament on several occasions asserted the necessity of a broad search and seizure power to control printing. Thus, an order of 1648 gave power to the searchers

 

“to search in any house or place where there is just cause of suspicion that Presses are kept and employed in the printing of Scandalous and lying Pamphlets, . . . [and] to seize such scandalous and lying pamphlets as they find upon search. . . .”

 

The Restoration brought a new licensing act in 1662. Under its authority, “messengers of the press” operated under the secretaries of state, who issued executive warrants for the seizure of persons and papers. These warrants, while sometimes specific in content, often gave the most general discretionary authority. For example, a warrant to Roger L’Estrange, the Surveyor of the Press, empowered him to “seize all seditious books and libels and to apprehend the authors, contrivers, printers, publishers, and dispersers of them,” and to

 

search any house, shop, printing room, chamber, warehouse, etc. for seditious, scandalous or unlicensed pictures, books, or papers, to bring away or deface the same, and the letter press, taking away all the copies. . . .]”

 

***

 

Although increasingly attacked, the licensing system was continued in effect for a time even after the Revolution of 1688, and executive warrants continued to issue for the search for and seizure of offending books. The Stationers’ Company was also ordered

 

“to make often and diligent searches in all such places you or any of you shall know or have any probable reason to suspect, and to seize all unlicensed, scandalous books and pamphlets. . . .”

 

And even when the device of prosecution for seditious libel replaced licensing as the principal governmental control of the press,  it too was enforced with the aid of general warrants — authorizing either the arrest of all persons connected with the publication of a particular libel and the search of their premises or the seizure of all the papers of a named person alleged to be connected with the publication of a libel.

And see this.

General warrants were largely declared illegal in Britain in 1765.  But the British continued to use general warrants in the American colonies.  In fact, the Revolutionary War was largely launched to stop the use of general warrants in the colonies.  King George gave various excuses of why general warrants were needed for the public good, of course … but such excuses were all hollow.

The New York Review of Books notes that the American government did not start to conduct mass surveillance against the American people until long after the Revolutionary War ended … but once started, the purpose was to crush dissent:

In the United States, political spying by the federal government began in the early part of the twentieth century, with the creation of the Bureau of Investigation in the Department of Justice on July 1, 1908. In more than one sense, the new agency was a descendant of the surveillance practices developed in France a century earlier, since it was initiated by US Attorney General Charles Joseph Bonaparte, a great nephew of Napoleon Bonaparte, who created it during a Congressional recess. Its establishment was denounced by Congressman Walter Smith of Iowa, who argued that “No general system of spying upon and espionage of the people, such as has prevailed in Russia, in France under the Empire, and at one time in Ireland, should be allowed to grow up.”

 

Nonetheless, the new Bureau became deeply engaged in political surveillance during World War I when federal authorities sought to gather information on those opposing American entry into the war and those opposing the draft. As a result of this surveillance, many hundreds of people were prosecuted under the 1917 Espionage Act and the 1918 Sedition Act for the peaceful expression of opinion about the war and the draft.

 

But it was during the Vietnam War that political surveillance in the United States reached its peak. Under Presidents Lyndon Johnson and, to an even greater extent, Richard Nixon, there was a systematic effort by various agencies, including the United States Army, to gather information on those involved in anti-war protests. Millions of Americans took part in such protests and the federal government—as well as many state and local agencies—gathered enormous amounts of information on them. Here are just three of the numerous examples of political surveillance in that era:

  • In the 1960s in Rochester, New York, the local police department launched Operation SAFE (Scout Awareness for Emergency). It involved twenty thousand boy scouts living in the vicinity of Rochester. They got identification cards marked with their thumb prints. On the cards were the telephone numbers of the local police and the FBI. The scouts participating in the program were given a list of suspicious activities that they were to report.
  • In 1969, the FBI learned that one of the sponsors of an anti-war demonstration in Washington, DC, was a New York City-based organization, the Fifth Avenue Peace Parade Committee, that chartered buses to take protesters to the event. The FBI visited the bank where the organization maintained its account to get photocopies of the checks written to reserve places on the buses and, thereby, to identify participants in the demonstration. One of the other federal agencies given the information by the FBI was the Internal Revenue Service.

***

 

The National Security Agency was involved in the domestic political surveillance of that era as well. Decades before the Internet, under the direction of President Nixon, the NSA made arrangements with the major communications firms of the time such as RCA Global and Western Union to obtain copies of telegrams. When the matter came before the courts, the Nixon Administration argued that the president had inherent authority to protect the country against subversion. In a unanimous decision in 1972, however, the US Supreme Court rejected the claim that the president had the authority to disregard the requirement of the Fourth Amendment for a judicial warrant.

 

***

 

Much of the political surveillance of the 1960s and the 1970s and of the period going back to World War I consisted in efforts to identify organizations that were critical of government policies, or that were proponents of various causes the government didn’t like, and to gather information on their adherents. It was not always clear how this information was used. As best it is possible to establish, the main use was to block some of those who were identified with certain causes from obtaining public employment or some kinds of private employment. Those who were victimized in this way rarely discovered the reason they had been excluded.

 

Efforts to protect civil liberties during that era eventually led to the destruction of many of these records, sometimes after those whose activities were monitored were given an opportunity to examine them. In many cases, this prevented surveillance records from being used to harm those who were spied on. Yet great vigilance by organizations such as the ACLU and the Center for Constitutional Rights, which brought a large number of court cases challenging political surveillance, was required to safeguard rights. The collection of data concerning the activities of US citizens did not take place for benign purposes.

 

***

 

Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them. The first target was the Communist Party of the United States, but subsequent targets ranged from the Reverend Martin Luther King, Jr. and his Southern Christian Leadership Conference to organizations espousing women’s rights to right wing organizations such as the National States Rights Party.

 

A well-known example of COINTELPRO was the FBI’s planting in 1964 of false documents about William Albertson, a long-time Communist Party official, that persuaded the Communist Party that Albertson was an FBI informant. Amid major publicity, Albertson was expelled from the party, lost all his friends, and was fired from his job. Until his death in an automobile accident in 1972, he tried to prove that he was not a snitch, but the case was not resolved until 1989, when the FBI agreed to pay Albertson’s widow $170,000 to settle her lawsuit against the government.

 

COINTELPRO was eventually halted by J. Edgar Hoover after activists broke into a small FBI office in Media, Pennsylvania, in 1971, and released stolen documents about the program to the press. The lesson of COINTELPRO is that any government agency that is able to gather information through political surveillance will be tempted to use that information. After a time, the passive accumulation of data may seem insufficient and it may be used aggressively. This may take place long after the information is initially collected and may involve officials who had nothing to do with the original decision to engage in surveillance.

Indeed, during the Vietnam war, the NSA spied on Senator Frank Church because of his criticism of the Vietnam War. The NSA also spied on Senator Howard Baker.

Senator Church – the head of a congressional committee investigating Cointelpro – warned in 1975:

[NSA's] capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.  [If a dictator ever took over, the N.S.A.] could enable it to impose total tyranny, and there would be no way to fight back.

This is, in fact, what’s happened …

Initially, American constitutional law experts say that the NSA is doing exactly the same thing to the American people today which King George did to the Colonists … using “general warrant” type spying.

And it is clear that the government is using its massive spy programs in order to track those who question government policies. See this, this, this  and this.

Todd Gitlin – chair of the PhD program in communications at Columbia University, and a professor of journalism and sociology -  notes:

Under the Freedom of Information Act, the Partnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups — during the very time that they were missing actual warnings about actual terrorist actions.

 

From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI, and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places.  In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’”

 

Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center (BRIC), one of 77 coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily.  As the investigative journalist Michael Isikoff recently reported, they were not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’”

 

It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber.  That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either.  The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of…Code Pink and Veterans for Peace.

 

***

 

In Alaska, Alabama, Florida, Mississippi, Tennessee, and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations — and vice versa.

 

Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.”  Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.”  Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:

 

• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”

 

• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to… [22] campus police officials… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”

 

• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on Nov. 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services (NCIS) reported to DSAC on the relationship between OWS and organized labor.”

 

• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” ***

 

• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee, and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.

 

• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.”  Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’”

 

***

 

In 2010, the American Civil Liberties Union of Tennessee learned … that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents.  The letter encourages schools to be supportive of all religious beliefs during the holiday season.”

 

***

 

Consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’”

 

***

 

And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies.  According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’”  The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’

 

Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”

 

***

 

In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department Inspector General’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects.  The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.

 

“The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor.  He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.”

 

The sequel was not quite so droll.  The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.

 

Moreover, at least one fusion center has involved military intelligence in civilian law enforcement.  In 2009, a military operative from Fort Lewis, Washington, worked undercover collecting information on peace groups in the Northwest.  In fact, he helped run the Port Militarization Resistance group’s Listserv.  Once uncovered, he told activists there were others doing similar work in the Army.  How much the military spies on American citizens is unknown and, at the moment at least, unknowable.

 

Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos — I have some in my own heavily redacted files obtained through an FOIA request — were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case.  During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to Military Surveillance of Civilian Politics, 1967-70, an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews.  They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Yes, we hear echoes to the Cointelpro program of the 60s and 70s … as well as King George’s General Warrants to the Colonies … and the Star Chamber of 15th century England.

Because – whatever governments may say – mass surveillance is always used to crush dissent.

Read Full Post »


CIA BUSY IN RUSSIA? with videos here


The December 2013 bus bombing in Volgograd.

Arthur Atayev, of Russia’s Institute of Strategic Research says that the organisers of the attacks in VOLGOGRAD “are located outside Russia (presumably the CIA and its friends).

 

“And they have been launching destabilizing attacks in Russia for a long time in order to reduce its foreign policy influence…”

Peter Power, Managing Director of Crisis Management at Visor Consultants, says that the terrorists concentrate on obvious targets.

He says: “Volgograd is a transport hub for this part of Russia…


“So transport, communication, economy – all these issues are pretty obvious targets to hit and produce an immediate impact on the Russian public, and not only Russian but also for those who are travelling there next year.”
Cannabis Ad

Read Full Post »


CIA probe into Bay of Pigs should be kept secret – Obama admin

14 Dec 2013 Over 50 years after the Bay of Pigs invasion went awry, the US federal government is still attempting to keep secrets about the failed overthrow of the Cuban government, with an Obama administration lawyer arguing this week to keep a document classified. The National Security Archive, a private research institution, has sought to force the government to hand over the fifth of a five-volume internal account of the Bay of Pigs. Penned by a CIA staff historian in the years between 1973 and 1984, the final document chronicles – and presumably critiques – the CIA’s own investigation of how the invasion went wrong.

Read Full Post »


EXCLUSIVE: CIA Psychologist’s Notes Reveal True Purpose Behind Bush’s Torture Program

7tp-033111-7_0.jpg

This diagram was included in a paper written by Dr. Bruce Jessen’s and shows his view of the conflicting psychological pressures bearing down on a prisoner who is held captive by an enemy. (Click here to view full image.)

December 7, 2013

Dr. Bruce Jessen’s handwritten notes describe some of the torture techniques that were used to “exploit” “war on terror” detainees in custody of the CIA and Department of Defense.

Bush administration officials have long asserted that the torture techniques used on “war on terror” detainees were utilized as a last resort in an effort to gain actionable intelligence to thwart pending terrorist attacks against the United States and its interests abroad.

But the handwritten notes obtained exclusively by Truthout drafted two decades ago by Dr. John Bruce Jessen, the psychologist who was under contract to the CIA and credited as being one of the architects of the government’s top-secret torture program, tell a dramatically different story about the reasons detainees were brutalized and it was not just about obtaining intelligence.

Jason Leopold interviews Jessen’s former SERE colleague, retired Air Force Capt. Michael Kearns.

Rather, as Jessen’s notes explain, torture was used to “exploit” detainees, that is, to break them down physically and mentally, in order to get them to “collaborate” with government authorities. Jessen’s notes emphasize how a “detainer” uses the stresses of detention to produce the appearance of compliance in a prisoner.

Click to view notes larger.

Click to view larger.

Indeed, a report released in 2009 by the Senate Armed Services Committee about the treatment of detainees in US custody said Jessen was the author of a “Draft Exploitation Plan” presented to the Pentagon in April 2002 that was implemetned  at Guantanamo and at prison facilities in Iraq and Afghanistan. But to what degree is unknown because the document remains classified. Jessen also co-authored a memo in February 2002 on “Prisoner Handling Recommendations” at Guantanamo, which is also classified.

Moreover, the Armed Services Committee’s report noted that torture techniques approved by the Bush administration were based on survival training exercises US military personnel were taught by individuals like Jessen if they were captured by an enemy regime and subjected to “illegal exploitation” in violation of the Geneva Conventions.

Jessen’s notes, prepared for an Air Force survival training course that he later “reverse engineered” when he helped design the Bush administration’s torture program, however, go into far greater detail than the Armed Services Committee’s report in explaining how prisoners would be broken down physically and psychologically by their captors. The notes say survival training students could “combat interrogation and torture” if they are captured by an enemy regime by undergoing intense training exercises, using “cognitive” and “exposure techniques” to develop “stress inoculation.” [Click here to download a PDF file of Jessen's handwritten notes. Click here to download a zip file of Jessen's notes in typewritten form.]

The documents stand as the first piece of hard evidence to surface in nine years that further explains the psychological aspects of the Bush administration’s torture program and the rationale for subjecting detainees to so-called “enhanced interrogation techniques.”

Jessen’s notes were provided to Truthout by retired Air Force Capt. Michael Kearns, a “master” SERE instructor and decorated veteran who has previously held high-ranking positions within the Air Force Headquarters Staff and Department of Defense (DoD).

Kearns and his boss, Roger Aldrich, the head of the Air Force Intelligence’s Special Survial Training Program (SSTP), based out of Fairchild Air Force Base in Spokane, Washington, hired Jessen in May 1989. Kearns, who was head of operations at SSTP and trained thousands of service members, said Jessen was brought into the program due to an increase in the number of new survival training courses being taught and “the fact that it required psychological expertise on hand in a full-time basis.”

“Special Mission Units”

Jessen, then the chief of Psychology Service at the US Air Force Survival School, immediately started to work directly with Kearns on “a new course for special mission units (SMUs), which had as its goal individual resistance to terrorist exploitation.”

The course, known as SV-91, was developed for the Survival Evasion Resistance Escape (SERE) branch of the US Air Force Intelligence Agency, which acted as the Executive Agent Action Office for the Joint Chiefs of Staff. Jessen’s notes formed the basis for one part of SV-91, “Psychological Aspects of Detention.”

Special mission units fall under the guise of the DoD’s clandestine Joint Special Operations Command (JSOC) and engage in a wide-range of highly classified counterterrorist and covert operations, or “special missions,” around the world, hundreds of who were personally trained by Kearns. The SV-91 course Jessen and Kearns were developing back in 1989 would later become known as “Special Survival for Special Mission Units.”

Before the inception of SV-91, the primary SERE course was SV-80, or Basic Combat Survival School for Resistance to Interrogation, which is where Jessen formerly worked. When Jessen was hired to work on SV-91, the vacancy at SV-80 was filled by psychologist Dr. James Mitchell, who was also contracted by the CIA to work at the agency’s top-secret black site prisons in Europe employing SERE torture techniques, such as the controlled drowning technique know as waterboarding, against detainees.

While they were still under contract to the CIA, the two men formed the “consulting” firm Mitchell, Jessen & Associates in March 2005. The “governing persons” of the company included Kearns’ former boss, Aldrich, SERE contractor David Tate, Joseph Matarazzo, a former president of the American Psychological Association and Randall Spivey, the ex-chief of Operations, Policy and Oversight Division of JPRA.

Mitchell, Jessen & Associates’ articles of incorporation have been “inactive” since October 22, 2009 and the business is now listed as “dissolved,” according to Washington state’s Secretary of State website.

Capt. Michael Kearns (left) and Dr. Bruce Jessen at Fort Bragg’s Nick Rowe SERE Training Center, 1989. Photo courtesy of retired Air Force Capt. Michael Kearns.

Lifting the “Veil of Secrecy”

Kearns was one of only two officers within DoD qualified to teach all three SERE-related courses within SSTP on a worldwide basis, according to a copy of a 1989 letter written by Aldrich, who nominated Kearns officer of the year.

He said he decided to come forward because he is outraged that Jessen used their work to help design the Bush administration’s torture program.

“I think it’s about time for SERE to come out from behind the veil of secrecy if we are to progress as a moral nation of laws,” Kearns said during a wide-ranging interview with Truthout. “To take this survival training program and turn it into some form of nationally sanctioned, purposeful program for the extraction of information, or to apply exploitation, is in total contradiction to human morality, and defies basic logic. When I first learned about interrogation, at basic intelligence training school, I read about Hans Scharff, a Nazi interrogator who later wrote an article for Argosy Magazine titled ‘Without Torture.’ That’s what I was taught – torture doesn’t work.”

What stands out in Jessen’s notes is that he believed torture was often used to produce false confessions. That was the end result after one high-value detainee who was tortured in early 2002 confessed to having information proving a link between the late Iraqi dictator Saddam Hussein and al-Qaeda, according to one former Bush administration official.

It was later revealed, however, that the prisoner, Ibn al-Shaykh al-Libi, had simply provided his captors a false confession so they would stop torturing him. Jessen appeared to be concerned with protecting the US military against falling victim to this exact kind of physical and psychological pressure in a hostile detention environment, recognizing that it would lead to, among other things, false confessions.

In a paper Jessen wrote accompanying his notes, “Psychological Advances in Training to Survive Captivity, Interrogation and Torture,” which was prepared for the symposium: “Advances in Clinical Psychological Support of National Security Affairs, Operational Problems in the Behavioral Sciences Course,” he suggested that additional “research” should be undertaken to determine “the measurability of optimum stress levels in training students to resist captivity.”

“The avenues appear inexhaustible” for further research in human exploitation, Jessen wrote.

Such “research” appears to have been the main underpinning of the Bush administration’s torture program. The experimental nature of these interrogation methods used on detainees held at Guantanamo and at CIA black site prisons have been noted by military and intelligence officials. The Armed Services Committee report cited a statement from Col. Britt Mallow, the commander of the Criminal Investigative Task Force (CITF), who noted that Guantanamo officials Maj. Gen. Mike Dunleavy and Maj. Gen. Geoffrey Miller used the term “battle lab” to describe the facility, meaning “that interrogations and other procedures there were to some degree experimental, and their lessons would benefit [the Department of Defense] in other places.”

What remains a mystery is why Jessen took a defensive survival training course and assisted in turning it into an offensive torture program.

Truthout attempted to reach Jessen over the past two months for comment, but we were unable to track him down. Messages left for him at a security firm in Alexandria, Virginia he has been affiliated with were not returned and phone numbers listed for him in Spokane were disconnected.

A New Emphasis on Terrorism

SV-91 was developed to place a new emphasis on terrorism as SERE-related courses pertaining to the cold war, such as SV-83, Special Survival for Sensitive Reconnaissance Operations (SRO), whose students flew secret missions over the Soviet Union, Eastern Bloc, and other communist countries, were being scaled back.

The official patch of the Special Survival Training ProgramThe official coin of the Special Survival Training Program

The official patch and coin of the Special Survival Training Program. (Photo courtesy of retired Air Force Capt. Michael Kearns)

SSTP evolved into the Joint Personnel Recovery Agency (JPRA), the DoD’s executive agency for SERE training, and was tapped by DoD General Counsel William “Jim” Haynes in 2002 to provide the agency with a list of interrogation techniques and the psychological impact those methods had on SERE trainees, with the aim of utilizing the same methods for use on detainees. Aldrich was working in a senior capacity at JPRA when Haynes contacted the agency to inquire about SERE.

The Army also runs a SERE school as does the Navy, which had utilized waterboarding as a training exercise on Navy SERE students that JPRA recommended to DoD as one of the torture techniques to use on high-value detainees.

Kearns said the value of Jessen’s notes, particularly as they relate to the psychological aspects of the Bush administration’s torture program, cannot be overstated.

“The Jessen notes clearly state the totality of what was being reverse-engineered – not just ‘enhanced interrogation techniques,’ but an entire program of exploitation of prisoners using torture as a central pillar,” he said. “What I think is important to note, as an ex-SERE Resistance to Interrogation instructor, is the focus of Jessen’s instruction. It is exploitation, not specifically interrogation. And this is not a picayune issue, because if one were to ‘reverse-engineer’ a course on resistance to exploitation then what one would get is a plan to exploit prisoners, not interrogate them. The CIA/DoD torture program appears to have the same goals as the terrorist organizations or enemy governments for which SV-91 and other SERE courses were created to defend against: the full exploitation of the prisoner in his intelligence, propaganda, or other needs held by the detaining power, such as the recruitment of informers and double agents. Those aspects of the US detainee program have not generally been discussed as part of the torture story in the American press.”

Ironically, in late 2001, while the DoD started to make inquiries about adapting SERE methods for the government’s interrogation program, Kearns received special permission from the US government to work as an intelligence officer for the Australian Department of Defence to teach the Australian Special Air Service (SAS) how to use SERE techniques to resist interrogation and torture if they were captured by terrorists. Australia had been a staunch supporter of the invasion of Afghanistan and sent troops there in late 2001.

Kearns, who recently waged an unsuccessful Congressional campaign in Colorado, was working on a spy novel two years ago and dug through boxes of “unclassified historical materials on intelligence” as part of his research when he happened to stumble upon Jessen’s notes for SV-91. He said he was “deeply shocked and surprised to see I’d kept a copy of these handwritten notes as certainly the originals would have been destroyed (shredded)” once they were typed up and made into proper course materials.

“I hadn’t seen these notes for over twenty years,” he said. “However, I’ll never forget that day in September 2009 when I discovered them. I instantly felt sick, and eventually vomited because I felt so badly physically and emotionally that day knowing that I worked with this person and this was the material that I believe was ‘reverse-engineered’ and used in part to design the torture program. When I found the Jessen papers, I made several copies and sent them to my friends as I thought this could be the smoking gun, which proves who knew what and when and possibly who sold a bag of rotten apples to the Bush administration.”

Kearns was, however, aware of the role SERE played in the torture program before he found Jessen’s notes, and in July 2008, he sent an email to the chairman of the Armed Services Committee, Sen. Carl Levin, who was investigating the issue and offered to share information with Levin about Jessen and the SERE program in general. The Michigan Democrat responded to Kearns saying he was “concerned about this issue” and that he “needed more information on the subject,” but Levin never followed up when Kearns offered to help.

“I don’t know how it went off the tracks, but the names of the people who testified at the Senate Armed Services, Senate Judiciary, and Select Intelligence committees were people I worked with, and several I supervised,” Kearns said. “It makes me sick to know people who knew better allowed this to happen.”

Levin’s office did not return phone calls or emails for comment. However, the report he released in April 2009, “Inquiry Into the Treatment of Detainees in US Custody,” refers to SV-91. The report includes a list of acronyms used throughout the report, one of which is “S-V91,” identified as “the Department of Defense High Risk Survival Training” course. But there is no other mention throughout the report of SV-91 or the term “High Risk Survival Training,” possibly due to the fact that sections of the report where it is discussed remain classified. Still, the failure by Levin and his staff to follow up with Kearns–the key military official who had retained Jessen’s notes and helped develop the very course those notes were based upon that was cited in the report–suggests Levin’s investigation is somewhat incomplete.

Control and Dependence

A copy of the syllabus for SV-91, obtained by Truthout from another source who requested anonymity, states that the class was created “to provide special training for selected individuals that will enable them to withstand exploitation methods in the event of capture during peacetime operations…. to cope with such exploitation and deny their detainers useable information or propaganda.”

Although the syllabus focuses on propaganda and interrogation for information as the primary means of exploiting prisoners, Jessen’s notes amplify what was taught to SERE students and later used against detainees captured after 9/11 . He wrote that a prisoner’s captors seek to “exploit” the prisoner through control and dependence.

“From the moment you are detained (if some kind of exploitation is your Detainer’s goal) everything your Detainer does will be contrived to bring about these factors: CONTROL, DEPENDENCY, COMPLIANCE AND COOPERATION,” Jessen wrote. “Your detainer will work to take away your sense of control. This will be done mostly by removing external control (i.e., sleep, food, communication, personal routines etc. )…Your detainer wants you to feel ‘EVERYTHING’ is dependent on him, from the smallest detail, (food, sleep, human interaction), to your release or your very life … Your detainer wants you to comply with everything he wishes. He will attempt to make everything from personal comfort to your release unavoidably connected to compliance in your mind.”

Jessen wrote that cooperation is the “end goal” of the detainer, who wants the detainee “to see that [the detainer] has ‘total’ control of you because you are completely dependent on him, and thus you must comply with his wishes. Therefore, it is absolutely inevitable that you must cooperate with him in some way (propaganda, special favors, confession, etc.).”

Jessen described the kinds of pressures that would be exerted on the prisoner to achieve this goal, including “fear of the unknown, loss of control, dehumanization, isolation,” and use of sensory deprivation and sensory “flooding.” He also included “physical” deprivations in his list of detainer “pressures.”

“Unlike everyday experiences, however, as a detainee we could be subjected to stressors/coercive pressures which we cannot completely control,” he wrote. “If these stressors are manipulated and increased against us, the cumulative effect can push us out of the optimum range of functioning. This is what the detainer wants, to get us ‘off balance.’”

“The Detainer wants us to experience a loss of composure in hopes we can be manipulated into some kind of collaboration…” Jessen wrote. “This is where you are most vulnerable to exploitation. This is where you are most likely to make mistakes, show emotions, act impulsively, become discouraged, etc. You are still close enough to being intact that you would appear convincing and your behavior would appear ‘uncoerced.’”

Kearns said, based on what he has read in declassified government documents and news reports about the role SERE played in the  Bush administration’s torture program, Jessen clearly “reverse-engieered” his lesson plan and used resistance methods to abuse “war on terror” detainees.

The SSTP course was “specifically and intentionally designed to assist American personnel held in hostile detention,” Kearns said. It was “not designed for interrogation, and certainly not torture. We were not interrogators we were ‘role-players’ who introduced enemy exploitation techniques into survival scenarios as student learning objectives in what could be called Socratic-style dilemma settings. More specifically, resistance techniques were learned via significant emotional experiences, which were intended to inculcate long-term valid and reliable survival routines in the student’s memory. The one rule we had was ‘hands off.’ No (human intelligence) operator could lay hands on a student in a ‘role play scenario’ because we knew they could never ‘go there’ in the real world.”

But after Jessen was hired, Kearns contends, Aldrich immediately trained him to become a mock interrogator using “SERE harsh resistance to interrogation methods even though medical services officers were explicitly excluded from the ‘laying on’ of hands in [resistance] ‘role-play’ scenarios.”

Aldrich, who now works with the Center for Personal Protection & Safety in Spokane, did not return calls for comment.

“Torture Paper”

The companion paper Jessen wrote included with his notes, which was also provided to Truthout by Kearns, eerily describes the same torturous interrogation methods US military personnel would face during detention that Jessen and Mitchell “reverse engineered” a little more than a decade later and that the CIA and DoD used against detainees.

Indeed, in a subsection of the paper, “Understanding the Prisoner of War Environment,” Jessen notes how a prisoner will be broken down in an attempt to get him to “collaborate” with his “detainer.”

“This issue of collaboration is ‘the most prominent deliberately controlled force against the (prisoner of war),” Jessen wrote. “The ability of the (prisoner of war) to successfully resist collaboration and cope with the obviously severe approach-avoidance conflict is complicated in a systematic and calculated way by his captors.

“These complications include: Threats of death, physical pressures including torture which result in psychological disturbances or deterioration, inadequate diet and sanitary facilities with constant debilitation and illness, attacks on the mental health via isolation, reinforcement of anxieties, sleeplessness, stimulus deprivation or flooding, disorientation, loss of control both internal and external locus, direct and indirect attack on the (prisoner of war’s) standards of honor, faith in himself, his organization, family, country, religion, or political beliefs … Few seem to be able to hold themselves completely immune to such rigorous behavior throughout all the vicissitudes of long captivity. Confronted with these conditions, the unprepared prisoner of war experiences unmanageable levels of fear and despair.”

“Specific (torture resistance) techniques,” Jessen wrote, “taught to and implemented by the military member in the prisoner of war setting are classified” and were not discussed in the paper he wrote. He added, “Resistance Training students must leave training with useful resistance skills and a clear understanding that they can successfully resist captivity, interrogation or torture.”

Kearns also declined to cite the specific interrogation techniques used during SERE training exercises because that information is still classified. Nor would he comment as to whether the interrogations used methods that matched or were similar to those identified in the August 2002 torture memo prepared by former Justice Department attorneys John Yoo and Jay Bybee.

However, according to the Senate Armed Services Committee report “SERE resistance training … was used to inform” Yoo and Bybee’s torture memo, specifically, nearly a dozen of the brutal techniques detainees were subjected to, which included waterboarding, sleep deprivation, painful stress positions, wall slamming and placing detainees in a confined space, such as a container, where his movement is restricted. The CIA’s Office of Technical Services told Yoo and Bybee the SERE techniques used to inform the torture memo were not harmful, according to declassified government documents.

Many of the “complications,” or torture techniques, Jessen wrote about, declassified government documents show, became a standard method of interrogation and torture used against all of the high-value detainees in custody of the CIA in early 2002, including Abu Zubaydah and self-professed 9/11 mastermind Khalid Sheikh Mohammed, as well as detainees held at Guantanamo and prison facilities in Iraq and Afghanistan.

The issue of “collaborating” with one’s detainer, which Jessen noted was the most important in terms of controlling a prisoner, is a common theme among the stories of detainees who were tortured and later released from Guantanamo.

For example, Mamdouh Habib, an Australian citizen who was rendered to Egypt and other countries where he was tortured before being sent to Guantanamo, wrote in his memoir, “My Story: the Tale of a Terrorist Who Wasn’t,” after he was released without charge, that interrogators at Guantanamo “tried to make detainees mistrust one another so that they would inform on each other during interrogation.”

Binyam Mohamed, am Ethiopian-born British citizen, who the US rendered to a black site prison in Morocco, said that a British intelligence informant, a person he knew and who was recurited, came to him in his Moroccan cell and told him that if he became an intelligence asset for the British, his torture, which included scalpel cuts to his penis, would end. In December 2009, British government officials released documents that show Mohamed was subjected to SERE torture techniques during his captivity in the spring of 2002.

Abdul Aziz Naji, an Algerian prisoner at Guantanamo until he was forcibly repatriated against his wishes to Algeria in July 2010, told an Algerian newspaper that “some detainees had been promised to be granted political asylum opportunity in exchange of [sic] a spying role within the detention camp.”

Mohamedou Ould Salahi, whose surname is sometimes spelled “Slahi,” is a Mauritanian who was tortured in Jordan and Guantanamo. Investigative journalist Andy Worthington reported that Salahi was subjected to “prolonged isolation, prolonged sleep deprivation, beatings, death threats, and threats that his mother would be brought to Guantanamo and gang-raped” unless he collaborated with his interrogators. Salahi finally decided to become an informant for the US in 2003. As a result, Salahi was allowed to live in a special fenced-in compound, with television and refrigerator, allowed to garden, write and paint, “separated from other detainees in a cocoon designed to reward and protect.”

Still, despite collaborating with his detainers, the US government mounted a vigorous defense against Salahi’s petition for habeas corpus. His case continues to hang in legal limbo. Salahi’s fate speaks to the lesson Habib said he learned at Guantanamo: “you could never satisfy your interrogator.” Habib felt informants were never released “because the Americans used them against the other detainees.”

Jessen’s and Mitchell’s mutimillion dollar government contract was terminated by CIA Director Leon Panetta in 2009. According to an Associated Press report, the CIA agreed to pay – to the tune of $5 million – the legal bills incurred by their consulting firm.

Recently a complaint filed against Mitchell with the Texas State Board of Examiners of Psychologists by a San Antonio-based psychologist, an attorney who defended three suspected terrorists imprisoned at Guantanamo and by Zubaydah’s attorney Joseph Margulies. Their complaint sought to strip Mitchell of his license to practice psychology for violating the board’s rules as a result of the hands-on role he played in torturing detainees, was dismissed due to what the board said was a lack of evidence. Mitchell, who lives in Florida, is licensed in Texas. A similar complaint against Jessen may soon be filed in Idaho, where he is licensed to practice psychology.

Kearns, who took a graduate course in cognitive psychotherapy in 1988 taught by Jessen, still can’t comprehend what motivated his former colleague to turn to the “dark side.”

“Bruce Jessen knew better,” Kearns said, who retired in 1991 and is now working on his Ph.D in educational psychology. “His duplicitous act is appalling to me and shall haunt me for the rest of my life.

Read Full Post »


Read Full Post »


JFK nephew names ‘rogue CIA’ in JFK assassination plot

09 Nov 2013 Journalist Russ Baker, author of the best-selling “Family of Secrets: The Bush Dynasty, America’s Invisible Government,” has unearthed the startling coincidence that Lee Harvey Oswald’s principle handler, after he arrived back in the states from self-imposed exile in the Soviet Union, was George de Mohrenschildt, and that De Mohrenschildt’s nephew had roomed with George H. W. Bush at Phillips Academy in Andover, Massachusetts… An unusual assortment of national political figures were in or around Dallas on the day of the assassination or the day prior to it, including J. Edgar Hoover, according to William Penn Jones, an Army Brigadier General and owner of the Midlothian Mirror, Richard Nixon, according to a Pepsi Cola executive whose convention Nixon spoke at the night before, and George HW Bush, at that time a CIA operative. Nixon’s recollections of the day have been inconsistent, and HW Bush initially said that he did not recall where he was on that day, although Russ Baker shows that he was in Dallas but concocting elaborate “alibis.”

Read Full Post »


Perpetual occupation of Afghanistan: US to keep troops in place and funds flowing, perhaps indefinitely

–Billions of US tax dollars would be ‘managed by relevant Afghan institutions’ [Right, because they've managed it *so well* (most of it missing) all along!]

19 Nov 2013 While many Americans have been led to believe the war in Afghanistan will soon be over [Obusha lied], a draft of a key U.S.-Afghan security deal obtained by NBC News shows the United States is prepared to maintain military outposts in Afghanistan for many years to come, and pay to support hundreds of thousands of Afghan security forces [and the US mercenaries to train them]. The wide-ranging document ['Security and Defense Cooperation Agreement Between the United States of America and the Islamic Republic of Afghanistan'], still unsigned by the United States and Afghanistan, has the potential to commit thousands of American troops to Afghanistan and spend billions of U.S. taxpayer dollars. The document outlines what appears to be the start of a new, open-ended military commitment in Afghanistan in the name of training and continuing to fight foment al-Qaeda [al-CIAduh].

[USociopaths want to slash Social Security and food stamps, while citizens FOREVER fund the CIA’s poppy fields in Afghanistan? This will not fly.

Read Full Post »


999083_539396816140563_1135623911_n

Read Full Post »


A citizens guide to understanding corporate media propaganda techniques

http://www.crestock.com/uploads/blog/2008/propagandaposters/us_propaganda-21.jpg

Editors Note: A few decades ago, there were thousands of independent media outlets in the US. Today in America, six multi-national global media mega corporations run by six individuals control 96% of the content Americans see on TV and watch at the movies; read in books, magazines and newspapers, and hear on the radio.

  • Time Warner
  • VIACOM
  • CBS
  • Walt Disney
  • News Corp
  • General Electric

Click this link below to see the details of who owns what.

Media Ownership Chart: The Big Six

These 6 corporations own the major entertainment theme parks, movie studios, television and radio broadcast networks, cable and satellite channels, video news, magazines, book publishers, sports entertainment, integrated telecommunications and the communications satellites themselves, wireless phones, video games software, electronic media, internet, record labels and the music industry, and more.

Everything you believe, more or less, is delivered to you by a monolithic six individuals running these corporations. They play golf together. They plot and scheme together. They are members of the same clubs and organizations.  These cretins see the people, the citizens… as donkeys or muppets who will believe anything. These demi gods decide in advance what the donkeys should believe and what attitudes they should have about everything.

Media Consolidation: The Illusion of Choice
Posted on November 22, 2011

by Jason (Frugal Dad)

Media Consolidation Infographic
Address


“Our job is to give people not what they want, but what we decide they ought to have.”- Richard Salent, Former President CBS News. 12,700,000 Google References

News is what someone wants to suppress. Everything else is advertising” – former NBC news President Rubin Frank 147,000 Google References

For better or worse, my company is a reflection of my character, my thinking, my values” – Rupert Murdoch 297,000,000 Google References

We are here to serve advertisers. That is our raison d’etre”  – CBS C.E.O. Michael Jordan  308,000 Google References

We have no obligation to make history. We have no obligation to make art. We have no obligation to make a statement. To make money is our only objective” – Michael Eisner, CEO, The Walt Disney Co 364,000 Google References

We are going to impose our agenda on the coverage by dealing with issues and subjects that we choose to deal with.” – Richard M. Cohen, Senior Producer of CBS political news. 1,360 Google references

We live in a dirty and dangerous world. There are some things the general public does not need to know and shouldn’t. I believe democracy flourishes when the government can take legitimate steps to keep its secrets, and when the press can decide whether to print what it knows.” – Katherine Meyer Graham, Washington Post publisher 41,500 Google References

“People shouldn’t expect the mass media to do investigative stories. That job belongs to the ‘fringe’ media.” – Ted Koppel – (American broadcast journalist, best known as the anchor for Nightline) 2770 Google References

“The Central Intelligence Agency owns everyone of any  significance  in the major  media.”–William Colby, former CIA Director, quoted by Dave Mcgowan, Derailing Democracy 167,000 Google References

“I know the secret of making the average American believe anything I want him to. Just let me control television. Americans are wired into their television sets. Over the last 30 years, they have come to look at their television sets and the images on the screen as reality. You put something on television and it becomes reality. If the world outside the television set contradicts the images, people start changing the world to make it more like the images and sounds of their television. Because its influence is so great, so pervasive, it has become part of our lives. You lose your sense of what is being done to you, but your mind is being shaped and molded.” – Hal Becker, Futures Group think-tank veteran - 709,000 Google References

Following this brief introduction is an attempt to enumerate powerful propaganda techniques being used on the American public and the world population by the corporate or so called “mainstream” (MSM) or mass media.

Having familiarized yourself with these techniques, you will be able to spot them as they are being deployed against you. The best way to counter propaganda is to understand the techniques and how they are used.

Note: This guide is being routinely updated and improved to incorporate reader feedback. We would like to thank George Orwell for numerous contributions. We would also like to thank people inside the corporate media for contributions.

framing [or re-framing] the debate

Debate a legitimate issue, and ostensibly have both sides represented, but instead on the continuum of opinion, have one from the middle and one from an extreme view and thus contain the debate to meet your ideological framing and goals. Alternatively, have a strong debater for one side, and a weak debater for the point of view you would like to suppress.

Framing (social sciences)
From Wikipedia, the free encyclopedia
A frame in social theory consists of a schema of interpretation — that is, a collection of anecdotes and stereotypes—that individuals rely on to understand and respond to events. In simpler terms, a person has, through their lifetime, built a series of mental emotional filters. They use these filters to make sense of the world. The choices they then make are influenced by their frame or emotional filters.
Address

Alternatively, the power of the media can re frame the entire context of a debate if desired.

ex:  a nuclear accident has occurred.

Instead of debating the effects of radiation release, float the idea using one of your “experts” or shills that radiation is good for you. Thus re frame the debate to whether or not radiation is good for you instead of how much it will take to cause cancer and disease.

ex:  re frame a debate about torture by instead of debating the legality or morality of torture, debate the effectiveness of torture techniques.

programming the viewers attitudes

This has become a very widely used propaganda technique.  Cover a story, complete with your ideological spin, and then follow up with interviews of  “ordinary people” who support your point of view but frame it as the popular point of view or the only point of view. If you have to do 1000 interviews to pick 2, the viewer never knows. The viewer walks away with a powerful form of sub conscious attitude programming as they hear the propaganda point regurgitated by someone “just like them”. This same technique can be used on letters to the editor, emails to TV news hosts, or wherever else cherry picking of public opinion can be conducted without tipping off the viewer, reader or listener. This powerful technique which is basically fraud, if deployed for long enough with consistent messages, can change an entire culture over time.

distraction

Instead of covering stories that matter, cover irrelevant, trivial stories about entertainers or celebrities and blow them up into grand productions so you don’t have to discuss anything that really matters, or when something happens that you don’t want to discuss but ordinarily would be forced by popular opinion to discuss, generate a distraction of your own sensational making which you discuss instead. By using the volume and coordination technique, the media monopolists can entirely obfuscate or bury important stories and issues of their choosing.

group think

TV programs often revolve around groups of people delivering the content or opinion because people programmed not to be able to think for themselves instinctively believe groups promoting a certain opinion more than one individual. They all nod their heads in agreement with whatever propaganda is to be pushed on you, and the idea is that you also will nod your head like a brain dead zombie.

This can all be punctuated by “experts”. The group of “experts” will collectively come to the “correct” conclusions for you so you don’t have to think for yourself, even if you still can.

guided Interpretation for the reader or viewer

In this technique, a journalist or anchorman will tell you what someone else said.

In some cases, quotes will be taken out of context, but in many cases an entirely concocted version of what was said will be passed off as the truth to an unsuspecting reader, listener or viewer.

What was actually said will not be referenced, because if the viewer or reader has access to what the actual content was, it exposes the fraud. That being the case, this technique is dangerous, because if the reader or viewer does have access to the source, the propaganda becomes apparent leaving distrust.

fluff and ice cream cones

Everyone loves an ice cream cone. Run feel good stories about puppies and teddy bears. Regardless of what really happens or the actual state of affairs, convey the message that all is good, America is great, and things are the same as they always have been. If cities decay, just don’t shoot wide shots of those cities any more.  Always project a disneylandish, cartoonish, surreal version of reality.

Leverage what people like and what people are compassionate towards to build  trust and leave the viewer feeling happy and complacent. Most importantly, establish trust and goodwill in your enterprise. Do everything necessary to give it the appearance of legitimacy no matter how fraudulent it is.  Always.

artificial reality

By framing the entire programming of the network, and by subtle editorializing over news stories, you can create an artificial reality, posing as the truth.

As a media mogul, you drive the programming and choose what to cover and how to cover it through your upper management, programming and editor selections. As a viewer, is is critically important to remember that every word read comes from a teleprompter, and the people who write, edit and select the copy are the ones actually delivering the content. The people who actually read the news to you are in that position because they are experts at reading propaganda and sounding convincing while doing it.

“For better or worse, my company is a reflection of my character, my thinking, my values” – Rupert Murdoch

good looking, likable, trusted newscaster:

“here is a story about someone who did the right thing”.

According to whom? The programming director?

Ex:  xyz is a desired reality or propaganda point….

good looking, likable, trusted newscaster says on the most widely watched news channel in America:

“I believe xyz and I think the majority of Americans are right there with me”.

Not.  This is pure propaganda in it’s most overt form.

“Never again will you be capable of ordinary human feeling. Everything will be dead inside you. Never again will you be capable of love, or friendship, or joy of living, or laughter, or curiosity, or courage, or integrity. You will be hollow. We shall squeeze you empty and then we shall fill you with ourselves. – George Orwell

direct programming

In this method, a story is covered with the specific intent of a viewer walking away holding a desired point of view. The actual coverage of the story as compared to the truth could range from slightly true to entirely untrue. The story is merely a tool to achieve an end result.

special interest ads posing as news stories

In this technique, a special interest advertisement will be crafted as if it is a news story and presented as such. Only the astute viewer will be able to spot the fraud.

Video news release
From Wikipedia, the free encyclopedia
A video news release (VNR) is a video segment created by a PR firm, advertising agency, marketing firm, corporation, or government agency and provided to television news stations for the purpose of informing, shaping public opinion, or to promote and publicize individuals, commercial products and services, or other interests. In this way, VNRs are video versions of press releases.
Address

the big lie technique

Tell a lie so large that no one will question the authenticity because of the size of the lie. This is a time tested, proven propaganda technique and used by the most infamous of  media controllers and propagandists.

Big Lie
From Wikipedia, the free encyclopedia
Address

omission

This is a simple, straightforward and effective technique. For news that doesn’t fit your agenda, or news that might cause your advertisers or special interest supporters to withhold support, for news that might not fit with the overall story line and talking points…just don’t cover the story. Alternatively, if a high profile person carries an opinion or message you would like to suppress, don’t ever invite that person as a guest. Since you and your peers didn’t cover it, it didn’t happen.

This very powerful tool combined with the volume and coordination technique gives a media mogul the ability to decide for everyone else what is and what is not important. Omission is often combined with the distraction technique.

volume and coordination

This is the opposite of omission. The goal of this technique is to create broad awareness of a propaganda point through a media deluge. This is often punctuated by many or all of the big six joining in unison to promote or hype the same propaganda point, idea or story. In this way, even a small or trivial item can be boosted to the forefront of collective consciousness. If desired, through TV, Magazines, movies and sitcoms, any point can be focused in the forefront of the mind of the population. This technique can be used effectively for short term or more importantly for long term results. As with many techniques in this guide, this technique becomes more effective the more consolidated the media becomes.

humanization and de humanization or personalization and de personalization

If you show dead bodies it generates a reaction. If you humanize a story, you generate sympathy for the victim. Alternatively if you avoid humanization or dehumanize atrocities or awful acts, you can avoid public sympathy being created. This technique is often used to report on war and decide on behalf of the viewer or reader who are the “good guys” and who are the “bad guys”. It doesn’t have to be used in wartime however. Propaganda pieces can be run to humanize bad guys or dehumanize good guys. This technique can and often does go so far as to frame a villain(s) as a victim(s) or vice versa. This is a very powerful technique which has been used with great effectiveness. Friends of the media are good. Enemies are bad.This technique alone can accomplish that goal when used by a skilled group of propagandists.

friendly fire

Repeatedly have as guests, people who strongly support your causes, or alternatively have weak debaters appear to represent causes you don’t support. A weak debater combined with a hostile interview can decimate a legitimate topic of debate or point of view.

historical revision

Omit unflattering feedback and generate your own positive feedback. Dead people and historical events are a prime target for historical revision in news, movies, mini series, or any other venue where a fictionalized account of the past or a past personality can be configured as truth by the network, studio or publication.

“Who controls the past controls the future. Who controls the present controls the past.” - George Orwell

winning the viewer

Attempt to foster goodwill and viewer loyalty by covering fluff stories using likable or attractive people and personalities in a way that ordinary viewers or readers can identify with. In this way, people are more likely to swallow the dope. This extends to using disaster and tragedy for shameless self promotion, ratings boosts, and leveraging of the media empire. Ideally, the consumers of your propaganda will love you as you program them.

“The ideal set up by the Party was something huge, terrible, and glittering—a world of steel and concrete, of monstrous machines and terrifying weapons—a nation of warriors and fanatics, marching forward in perfect unity, all thinking the same thoughts and shouting the same slogans, perpetually working, fighting, triumphing, persecuting—three hundred million people all with the same face.- George Orwell

emphasis and repetition

Cover stories which match your agenda over and over and over……and over. People will remember repetition and will come to believe anything if it is repeated often enough.

shills

Invite often, people with so called “credentials”, who pose as “experts”, “professors” or other lofty titles who support the network point of view as if it is the truth. Often, these so called experts will have a financial or career interest, or some other political or ideological affiliation regarding their point of view that is not disclosed. The Wikipedia entry below concentrates on “selling goods or services”. It is imperative to note that the “goods and services” could include a point of  view, or an ideology, or a political, social or religious position.

Shill
From Wikipedia, the free encyclopedia

A shill is person who is paid to help another person or organization to sell goods or services.
address

gatekeepers

Employ “trusted” personalities who pretend to be on the side of exposing media or government corruption and who represents the common citizen but who is in fact, dealing sophisticated propaganda.

Gatekeeper
From Wikipedia, the free encyclopedia
A gatekeeper is defined as someone who controls access to something. It also refers to individuals who decide whether a given message will be distributed by a mass medium.
Address

repeating a lie

George Orwell along with many infamous propagandists have said that if you repeat a lie frequently enough, people will take it to be true.

telling the truth

If the media selectively tells the truth on points where an ideological agenda or sponsorship is not at risk, that opportunity can be used to tell the truth and gain viewer confidence. It is critically important to occasionally tell the truth in order to maintain credibility or legitimacy.

fogging an issue

Sometimes special interest groups or sponsors will have an interest in making sure that as few people pay attention to an issue as possible, or alternatively that an issue is of little importance. A good propagandist can write a long, nonsensical article or offer a confusing video segment for the purpose of confusing the viewer or reader and obscuring any real issues through confusion or lack of interest. This technique can be used when the story is too big for the distraction or omission techniques.

vilification and character assassination

This is an important tool that is often used to keep politicians in line by fear and intimidation of what they know has already happened to people with the “wrong” opinion. People or personalities whose opinion or positions are to be suppressed are subtly (or not so subtly) vilified and sabotaged, usually by over blowing a trivial issue relating to something people are sympathetic to. Vilification is most effective when used subtly and over a long period of time, so the audience or readership becomes slowly programmed as to who is “good” and who is “bad”.  A broad array of techniques can be used ranging from hiring investigators to “dig up dirt”, then using the volume and coordination technique. The “He Said, She Said” technique is also employed for character assassination.  Using this method, the author or newscaster can cast the backlash to someone else and say something they know isn’t true, or isn’t fair, but they want to say it anyway. As a media moguel, your enemies become the people’s enemies and your friends become the people’s friends.  You can eject a politician or shame a public personality. This is an extremely effective and important arena. See also “character assassination via the question mark” under “cooking the headlines”.

keep only team players

If a newscaster, commentator or journalist or editor has the wrong opinion, fire them and replace them with someone who has the correct opinion. The looming threat of un-personing acts as a powerful compliance tool for field reporters and editors. During the past several years in America, there have been a lot of high profile corporate reporters, anchormen and anchorwomen who have been un personed within 24 hours of uttering the “wrong” opinion. Media moguel pimps hastily un person rogue reporters because it has a chilling effect on the remainder of their stable of whores.

embedded editorial views in news stories

In Journalism, the editorial page is where opinion is supposed to be expressed, but editorial views can be subtly introduced into “news” to program the viewer or reader.

As a media consumer, look for opinions which are stated as if they are fact. Facts can be substantiated, opinions cannot.

Also, be on the lookout for subtle inaccuracies,  or  a dismissive tone. Alternatively, editorial views can be injected into news by subtly misstating a topic, often a serious one, and pretending any objecting or concerned view of the treatment of the topic is silly, unrealistic, or just not necessary. This can become related to deciding who is sane on behalf of the viewer or reader.  The more subtly these opinions and distortions can be substituted for facts, the more powerful the propaganda tool of editorialized news. This technique can be punctuated or made more potent by keeping in line with your friends in Government who echo the same views as truth.

The largest and supposedly most respected media outlets in America today routinely sell editorial views as news. Corporate media journalism in America has morphed from informing the public, into something entirely sinister. In spite of this, most Americans remain in the dark as to the fraud and advanced PR techniques being hoisted upon them.

lies as truth

Run  a story or headline that you know isn’t true to support your point of view. In a subtler form, mis translate or misquote to suit. Alternatively, publish or sponsor polls intended to give a desired result.

From where Winston stood it was just possible to read, picked out on its white face in elegant lettering, the three slogans of the Party:”

  • WAR IS PEACE
  • FREEDOM IS SLAVERY
  • IGNORANCE IS STRENGTH

deciding who is sane on behalf of the viewer or reader

Portray points of view you would like to suppress as extreme, crazy, dangerous or not legitimate. If necessary, call in one or more of your “experts” for emphasis.

This effect can be multiplied by ensuring that members of the audience, even though they may have all collectively come to the same opinion,  if it is not the desired opinion, you ensure that each viewer believes they are crazy and alone in holding that point of view.  This is a potent technique used to form “mainstream” opinion.

Furthermore, as one of the six media owners, you can leverage the “correct mainstream opinion” by “behavior placement” in your sit coms, magazine articles, and on the radio. In behavior placement, one out of your stable of celebrity actors holds certain behaviors, ideas or attitudes that are either condoned or maligned by the rest of the cast. This could be an attitude, an opinion they hold regarding anything, a product they use,  ideas about religion or anything else.

Americans have become enamored with celebrities from decades of Hollywood propaganda. We have been conditioned to want to be like them. Celebrity behavior placement is a very, very powerful tool in the media owners arsenal.

advertising as news

Run goodwill stories about advertisers, or for that matter about your parent company, as if you are covering news or human interest stories. Effectively as a media mogul you can have free stealth advertising throughout your enterprise. If you own a theme park, have your news division do a “story’ about how great the theme park is. Punctuate that by cherry picking interviews and broadcasting them in the segment so viewers can hear it from others who are “just like themselves”.

the hostile or friendly interview

Interview people whose views you support in a friendly manner. Interview people whose views you would like to suppress in a hostile manner. This technique is most effective when kept low key.A variation of this techinique is to invite a guest for an “interview”, then have an aggressive personality talk over them the whole time and repeat as truth things they never said or things they said out of context.

A more advanced variation of this propaganda technique is to invite someone and label them as an “expert” or “professor” or any favorable handle for a “friendly” interview who does not well represent a cause or issue. The important distinction here is that the viewer sees a friendly interview and yet walks away unimpressed by the point of view.

humor as a propaganda tool

Feature comedians who support your point of view, ideological or religious agenda.  As a media moguel, it’s easy to get the muppets to laugh as you deride and attack your enemies with so called humor from your stable of “comedians”.  Use this “humor” for character assassination, vilification or to punctuate your propaganda regarding who is sane and who isn’t. If you tightly control your stable of prime time comedians,  people will only laugh at what you want them to laugh at. If a comedian in your A list isn’t with the program, then they disappear forever into obscurity.

unflattering (or flattering) handles

Corral an entire group of people into a pigeon hole, by crafting handles that carry positive or negative connotations.

Examples:

He is a “conspiracy theorist” (negative connotation) used to tar anyone who contradicts or attempts to expose the propaganda of the party line.

He is a “goldbug” (negative connotation) used to subliminally encourage the idea that someone favorable to owning gold is a kook or single minded extremist.

A “truther” – negative connotation label applied to any person who questions the government version of 911.

A “right wing (left wing) extremist” – to portray a given point of view as extreme, whether it is or not.

use the power of words to emphasize or de emphasize acts or information

The crowd was “peppered” with hellfire missiles.

trusted anchorman – “They criticize us for using enhanced interrogation techniques like waterboarding”*. MSNBC 2/22/2010

*Please note that waterboarding is currently defined in international law not as an “enhanced interrogation technique” but as torture. The United States put to death Japanese commanders accused of waterboarding. The public is not ok with torture, so you just re define it as an “enhanced interrogation technique”, and it’s fine.

collateral damage – when innocent people are killed in wartime, a suitable, soft term is needed. If an army accidentally inflicts collateral damage, even if that means killing scores, hundreds or thousands of innocent people, a simple two word term called “collateral damage” makes it ok.

divide and conquer

Create simple minded divisions between groups of people to keep them distracted and arguing among themselves over mostly trivial issues. Use black and white, good and evil, and particularly the faux left and right divide. Leave no room in the middle for discussion as if all opinions and issues are binary. When events happen, don’t ever discuss actual causes. As a media owner, you have your employees discuss the event, and make up the cause in your programming department.

using anonymous sources

Generate “news” using anonymous sources. This technique could range from mis quoting, to outright fabrication and lying. ie. an anonymous source that is entirely fiction and created to generate a certain reaction or artificial reality. Anonymous sources are used heavily in the US media to lay the propaganda groundwork and to manufacture the popular consent for wars of conquest and aggression.

using guided imagery

This is an advanced technique which is now pervasive in all PR, advertising and corporate programming as well as central banking.  The idea is a takeoff on the idea popularized by George Soros which is that “markets influence events they anticipate“. By the same token, there is an assumption that if the people are told something as if it is true, then it will in fact become true. You could call this molding public opinion. An example of this would be saying as if it is fact, “70 percent of the country is in favor of xyz”. The idea is that this repeated, will have the effect of causing the public opinion to actually be that. Another would be “we have green shoots” or “the country is out of the recession”, with the idea being that if you state this as fact, then people will have more confidence and spend and it will become true.

using music, lighting and effects

Music and lighting effects can be powerful promoters of feelings and emotion. Both are heavily employed, and deployed against the public. For example, when promoting the party line, be sure to have the music set to create all the right feelings and emotions. Wave the flag. Set your color scheme to red, white and blue. Create emphasis by dramatic lighting or by talking loud and fast of soft and somber.

The privilege of being a media mogul means having your personal points of view represented and delivered by people who are “just like” the audience to be programmed.

fabricated evidence

This technique is practiced by promoting as self sourced or repeating “evidence” that could range from non existent to fabricated. This could include doctored photographs to include, exclude or exaggerate information, audio recordings and video productions, as well as dossiers or written documents. Any or all of which promoted as “the truth” and may in fact have only some basis in truth or be entirely fabricated. It could in fact have been an entirely paid for promotion.

the pre emptive strike

A journalist, anchor or interviewer will attacks at the very outset of the article or segment with the “acceptable” view of the topic, prior to the topic. This is a brute force technique and is easy to spot. It usually involves some sort of angry tirade.

leveraging the media empire

The media empire can be used by the parent company for advertising, propaganda and goodwill. This is a very broad arena where subtle or overt techniques can be used.

As a multi national media mega corporation, you can use your music empire to promote your viewpoint or more importantly, eliminate alternative points of view. If the musicians on your record label step out of line, quietly retire them. Sign acts that for whatever reason, you personally like their message.

You can advertise for your theme park in the name of news. You can interview people who wrote books you published, or interview people who produced movies for a subsidiary. You can promote your ideals with a consistent message throughout your subsidiaries and enterprises. You can promote or demote points of view you agree or disagree with. You can use behavior placement in the sitcoms, movies and other programming arenas to produce a consistent message of your choosing.  As media empires become ever fewer, ever larger, and ever more powerful, this tactic becomes more and more potent.

serialization of a related chain of events and the memory hole

This technique works to reconcile incompatible truths by deconstructing all events to a serial chain, and discarding all past information unless not doing so proves particularly useful. This is what George Orwell referred to as the “memory hole”.

If you remember the past version of the truth, then often the current version of the truth is not compatible with that version of the truth; therefore there should be no memory of the past unless it is a reverse engineered version. Otherwise, incongruences are generated.  At least the news isn’t covering it. That’s the point.

You are supposed to forget the past and concentrate on what you are being told today. It’s all a serial chain of sound bites and propaganda intended and engineered to give desired current results. There are no causes and effects, only an unrelated serial chain of events.

Memory hole
From Wikipedia, the free encyclopedia
Address

cooking the headlines

Headline tickers offer endless opportunities for revisionist or deceptive news and fast, efficient propaganda programming. There are more people reading the headline tickers than are following the actual stories. For example, hundreds of people in an airport may be just following the headline ticker….people receiving a news stream on the internet may be only looking at headlines. Therefore, if you can cook the headlines you effectively get “propaganda leverage”. Furthermore, people remember the headlines without necessarily following the actual story.

technique #1. – deceptive headlines designed to convey a certain message, but based on an actual event

technique #2 – false headlines ie “WMD found in Iraq”. Over 70 percent of the US population came to believe that weapons of mass destruction were found in Iraq, and the reason is that headlines were running which repeatedly made that claim, although it was entirely untrue.

technique #3 – embedding propaganda as reasons in headlines, ie “stocks soared today because…(made up propaganda reason follows)”

technique #4 – overplay some headlines and underplay other headlines to decide on behalf of the viewer or reader what is important

repetition and trust

There are 300 million Americans in the United States and yet spanning the entire corporate media, the people invited on as regulars by the big six could fill a gymnasium. The point is that if “trusted” sources are developed and cultivated by the corporate media, people will come to believe what they say, regardless of what they say or how wrong they have been in the past.

Propagandists are held out by the corporate media to the public as “experts” who do not represent the centrist views of the majority of Americans, have been wrong about nearly everything they have ever said, and these people are never held to account. At the same time, people who have been correct or people who have views that represent mainstream America remain off the people’s radar, never or rarely invited as guests except maybe for a hostile interview.

In sum total this technique can be used to generate a heavy handed dose of artificial reality.

subliminal messages

Anything you say while wearing an American Flag lapel pin is patriotic.

The topic of subliminal messages could probably justify a post in itself. In short, at the subliminal level, advertisers and the media like to link things together. In general, they want to link positive things, things you want to be, things you see yourself as, things you support, things you desire or desire to be, to themselves, to the dope they are pushing, or to their advertisers. Music, lighting or sounds can be employed to create subliminal hypnotic effects. Behavior placement can be used for subliminal effects. If they are doing their job well, you will never even be aware it’s happening.

re framing the question

By re framing the question or subtly altering the question, or even by the possible answers offered to the question, a media enterprise can move the discussion to a different realm or even change the answer. This technique is often used for poll results to be used as propaganda. It can also be used to alter the subject of a debate.

engineered reality

Using this brute force technique, camera angles, staged events and engineered real time and post production effects can be added to a video feed to dramatically alter the viewers perception. With the correct camera angle, a small crowd can be made to seem large or vice versa.

If your media company would like to minimize or maximize a protest to suit your ideological agenda, it can be covered using a camera angle minimizing or maximizing the crowd, along with a suitable dialogue which confirms the selected camera angle and desired viewer take away. This can be followed up using other techniques such as cherry picked interviews with participants to deliver whatever message is desired.

Using a laugh track you can program the viewers in terms of what is perceived to be funny. Other audio effects can also be added. Real time audio and video production techniques can augment or add elements to a video feed that weren’t present in the un doctored feed.

investigative journalism (or lack thereof) as a weapon or a tool

Using the guise of investigative journalism, corporate media can either bag a victim or let a friend off the hook. This can be used on politicians, people in the public spotlight, or anyone whose views are to be suppressed or promoted.

Of all the controversy surrounding 911, one of the most mysterious aspects is that there were very unusual large option bets placed prior to the incident which paid hundreds of millions, if not billions to the account holders who placed those bets. By law, every account holder who places a trade on a US exchange is known and can be easily traced by any federal law enforcement or regulatory body. To date, almost ten years after the event, these profiteers were never identified and there was never any effort by the corporate media using investigative journalism to force the disclosure to the American people, when there easily could have been. This is a glaring example of a lack of investigative journalism being used as a tool and corporate media complicity in nefarious, treasonous deeds.

“People shouldn’t expect the mass media to do investigative stories. That job belongs to the ‘fringe’ media.” – Ted Koppel – (American broadcast journalist, best known as the anchor for Nightline) 2770 Google References

leading the viewer or reader

This is a powerful, simple technique which is used pervasively to introduce editorial content into news. This works by leading the viewer or reader in a subtle way to a pre defined conclusion, or to make the subject look awkward for disagreeing with propaganda pre established by the host.

From the newscaster to the interviewee:

Don’t you think that (thing to be agreed with follows).

Wouldn’t you agree with (high profile “expert” who has never been correct about anything and returns every week to spew propaganda) that (xyz propaganda point).

I know I (propaganda point), what about you?

Most Americans believe (propaganda point) what is your opinion?

Fewer and fewer people (propaganda point).

Everyone wants (propaganda point).

The best case is (propaganda point).

planting seeds of doubt

Character assassination via the question mark. This is a very powerful technique which can be used for character assassination while avoiding lawsuits. The way it is done is to pose outrageous and libelous character assassination as a question, and thus plant seeds of doubt in the mind of the viewer or reader. This is best illustrated by example:

Ron Paul: Terrorist?

Token Equal Time

The goal of this technique is to create an appearance of fairness. it consists of an article or video segment written or broadcast with entirely one point of view, then at the end a meager statement from the opposing view is mentioned, then immediately refuted. In this way the reader absorbs the intended point of view while at the same time believing the topic has had fair treatment.

“May Have” Technique

The words “may have” provide endless opportunities for programming a zombie audience.  This is a form of character assassination and similar to character assassination via the question mark. As a media exec, you will be planting and cultivating seeds of doubt.

“Iran may have committed a cyber-attack on the BBC”
“AP: Iran may be cleaning up nuclear traces at military site”
“BBC News – Iran ‘may boost nuclear programme’, diplomat warns”

Now contrast to these hypothetical headlines:
“Iran MAY NOT have committed a cyber-attack on the BBC”
“AP: Iran MAY NOT be cleaning up nuclear traces at military site”
“BBC News – Iran ‘MAY NOT boost nuclear programme’, diplomat warns”

The original double-talk “may have’s” convey the LIES (but with plausible deniability):

As a viewer or listener, you should be acutely aware of the use of the words “may have”  by the media propagandists.

Sex sells news

Pasty faced bimbos with silicone cleavage, bubbly personalities and enough botox to immobilize cattle… as fake as the half baked teleprompter propaganda they’re serving up to a nation of  300 million muppets.

It doesn’t really matter what they say, and no one really cares….because the men aren’t listening.  This is why programs which cater to a male audience like financial news channels are stacked with stacked bimbos who couldn’t tell a debenture from a derivative.

Why else would anyone listen to a casino operator pimping their casino day in and day out?  Men will go so far as to watch with the sound muted. It’s a cheap trick to gain viewers who otherwise would be disinterested in the endless, incessant propaganda and disdain for the truth pitch.

enough said.

In total, when these potent techniques are used synergistically, the entire fabric of a society can be guided, shaped and molded. Your only defenses are awareness and even better, turning it off.

Of course the people don’t want war. But after all, it’s the leaders of the country who determine the policy, and it’s always a simple matter to drag the people along whether it’s a democracy, a fascist dictatorship, or a parliament, or a communist dictatorship. Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked, and denounce the pacifists for lack of patriotism, and exposing the country to greater danger.“– Herman Goering at the Nuremberg trials

“If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the state can shield the people from the political, economic and/or military consequences of the lie … The truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the state.”–Joseph Goebbels, minister of propaganda in Nazi Germany, 1933-1945

“See, in my line of work you got to keep repeating things over and over and over again for the truth to sink in, to kind of catapult the propaganda.” – George W. Bush 43rd US President

“The Media-Lobbying Complex”: Investigation Exposes Undisclosed Corporate Ties of Network Political Pundits
Democracy Now
A four-month investigation into the covert corporate influence on cable news found that since 2007 at least seventy-five registered lobbyists, public relations representatives and corporate officials have repeatedly appeared on MSNBC, Fox News, CNN, CNBC and Fox Business Network with no disclosure that they are paid by corporate interests. We speak to journalist Sebastian Jones, who carried out the investigation for The Nation magazine.
Address

Unplug the Signal: The Truth Will Not Be Televised
Nathan Janes
PUPAGANDA.com
The fuel for this vehicle of mass deception is a technique known as perception management where an array of psychological techniques are used to alter the truth, leading the viewer to a desired conclusion. Some call this spin or propaganda while others know it as lying.
Address

News propaganda
From Wikipedia, the free encyclopedia
A New York Times editorial (March 16, 2005) entitled “And now, the counterfeit news” affirms that at least 20 U.S. federal agencies, like the Department of Defense and the U.S. Census Bureau, produced and distributed hundreds of TV news reports since 2001 that were aired as if they were produced by the media. The same report says that this practice was also utilized by the Clinton Administration. Another report [2] details the use of this practice by the United States Department of Agriculture.
Address

Media “Distortions”
Address

Edit: Add Miscellaneous quotes about media and propaganda

Only the mob and the elite can be attracted by the momentum of totalitarianism itself. The masses have to be won by propaganda.” —Hannah Arendt, The Origins of Totalitarianism, 1951

Edit: Add George Orwell’s greatest hits

“The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power. Not wealth or luxury or long life or happiness: only power, pure power. What pure power means you will understand presently. We are different from all the oligarchies of the past, in that we know what we are doing. All the others, even those who resembled ourselves, were cowards and hypocrites. The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just round the corner there lay a paradise where human beings would be free and equal. We are not like that. We know that no one ever seizes power with the intention of relinquishing it. Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power.” - George Orwell

“And I believe that totalitarianism, if not fought against, could triumph again.” – George Orwell

“All the war-propaganda, all the screaming and lies and hatred, comes invariably from people who are not fighting. “ – George Orwell

“Doublethink means the power of holding two contradictory beliefs in one’s mind simultaneously, and accepting both of them.” – George Orwell

To see what is in front of one’s nose needs a constant struggle.” – George Orwell

“During times of universal deceit, telling the truth becomes a revolutionary act.” - George Orwell

At any given moment there is an orthodoxy, a body of ideas of which it is assumed that all right-thinking people will accept without question. It is not exactly forbidden to say this, that or the other, but it is “not done” to say it… Anyone who challenges the prevailing orthodoxy finds himself silenced with surprising effectiveness. A genuinely unfashionable opinion is almost never given a fair hearing, either in the popular press or in the high-brow periodicals“. — George Orwell, 1945, Introduction to ‘Animal Farm.’

“Freedom is the right to tell people what they do not want to hear”- George Orwell

“If you want a vision of the future, imagine a boot stamping on a human face – forever.” – George Orwell

“Power is not a means, it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship.- George Orwell

“Sometimes the first duty of intelligent men is the restatement of the obvious.” - George Orwell

“The very concept of objective truth is fading out of the world. Lies will pass into history.” - George Orwell

“Whoever is winning at the moment will always seem to be invincible.” - George Orwell

“The Central Intelligence Agency owns everyone of any  significance  in the major  media.”–William Colby, former CIA Director, quoted by Dave Mcgowan, Derailing Democracy

“There is quite an incredible spread of relationships.  You don’t need to manipulate Time magazine, for example, because there are [Central  Intelligence] Agency  people at the management level.”–William B. Bader, former CIA intelligence officer, briefing members of the Senate Intelligence Committee, The CIA and the Media, by Carl Bernstein

“The Agency’s relationship with [The New York] Times was by far its most valuable among newspapers, according to CIA officials.  [It was] general Times policy … to provide assistance to the CIA whenever possible.”–The CIA and the Media, by Carl Bernstein

“You could get a journalist cheaper than a good call girl, for a couple hundred dollars a month.”–CIA operative, discussing the availability and prices of journalists willing to peddle CIA propaganda and cover stories. Katherine the Great, by Deborah Davis

Edit: Add

Zero Point Of Systemic Collapse
By Chris Hedges
12 February, 2010
Address

Corporate Lobbyists and Public Relations Firms behind Cable News Outlets
by Sherwood Ross
Global Research
Since 2007, at least 75 registered lobbyists, public relations representatives and corporate officials have appeared on cable news broadcasts “with no disclosure of the corporate interests that paid them,” The Nation magazine (March 1) reveals. Many of these people are “paid by companies and trade groups to manage their public image and promote their financial and political interests,” writes the magazine’s Sebastian Jones, a freelance reporter after a four-month-long probe. “Many have been regulars on more than one of the cable networks, turning in dozens—and in some cases hundreds—of appearances,” Jones reports. For example, Tom Ridge, identified as the former governor of Pennsylvania, appeared on MSNBC’s Hardball With Chris Matthews urging the White House to “create nuclear power plants.” What viewers were not told, though, is that Ridge since 2005 has pocketed $530,659 in executive compensation for serving on the board of Exelon, the nation’s biggest nuclear power company, Jones writes.
Address

Fox News Exposed – Florida Supreme Court Approves Lying to Public
Address
NBC’s ‘cynical’ mind-control games
The network admits it uses “behavior placement” on popular shows to encourage healthy, eco-friendly habits — and sell ads.
April 9, 2010,
Address
Distrust In US Media Hits Record High, As CNBC (And Especially Mad Money) Viewership Drops To Multi-Year Low
by Tyler Durden
09/29/2010
In today’s “less than surprising data point” category, the clear winner is Gallup’s analysis of people’s ever increasing distrust in the mass media. From 46% in 1998, the percentage of people who indicate they have “not very much/none at all” trust in mass media has grown to a stunning 57% currently. This is an all time record, as the general public perception toward the MSM has flipped over the past decade. Is it becoming increasingly more difficult to lie to the average American?
Address : <http://www.zerohedge.com/article/distrust-us-media-hits-record-high-cnbc-and-especially-mad-money-viewership-drops-multi-year&gt;

Mainstream media losing its mojo
http://www.prisonplanet.com/mainstream-media-losing-its-mojo.html

Government accused of manipulating science news

Wednesday, September 29, 2010
By Emily Chung, CBC News
Kathryn O’Hara, president of the Canadian Science Writers’ Association, writes that ‘openness is being held ransom to media messages that serve the government’s political agenda.’Kathryn O’Hara, president of the Canadian Science Writers’ Association, writes that ‘openness is being held ransom to media messages that serve the government’s political agenda.’ (Courtesy of Canadian Science Writers’ Association) The federal government engages in “unacceptable political interference” in the communication of government science, says the head of a group that represents both government press officers and science journalists. “Openness is being held ransom to media messages that serve the government’s political agenda,” wrote Kathryn O’Hara, president of the Canadian Science Writers’ Association, in an opinion published online Wednesday in the international scientific journal Nature.
Address : <http://www.cbc.ca/canada/story/2010/09/29/federal-scientists-media-government.html#ixzz111GZOPU6>
Collapsing Story of the Bin Laden Kill: Our Pathological Liars, the Govt/Media/Military/Hollywood
[redacted] news
The truth behind the raid and the alleged assassination of Bin Laden is moving further away from the dramatic tale President Obama told the nation on Sunday night with each passing day. But that’s to be expected from a US military-industrial complex that has a habit of manufacturing fables to dupe the American public into accepting the delusion that is the “war on terror”. Take for example the gargantuan psychological warfare salvo that the US government launched against its own people in the immediate aftermath of the Jessica Lynch “rescue” In crafting the Jessica Lynch fable, “The Pentagon had been influenced by Hollywood producers of reality TV and action movies,” reported the Guardian, including Black Hawk Down director Jerry Bruckheimer, who visited the Pentagon personally on numerous occasions before the event to discuss how occupations overseas could be humanized for means of better mass consumption on behalf of the American public.
http://redactednews.blogspot.com/2011/05/collapsing-story-of-bin-laden-kill-our.html

Read Full Post »


Narcotics: Business of Western wars

Container trucks carrying NATO supplies are seen parked at the Pakistani town of Chaman, before being moved to Afghanistan, July 27, 2012.

Container trucks carrying NATO supplies are seen parked at the Pakistani town of Chaman, before being moved to Afghanistan, July 27, 2012.
Sun Sep 29, 2013 8:31AM
By Gordon Duff

Heroin trafficking is the lubrication that keeps the wheels of Western politics moving as intended.”

Related Interviews:
It was only a week ago that the US government released Eric Harroun, a former soldier who had been fighting with foreign backed al-Qaeda terrorists and the CIA against the Assad government in Syria.

This week, former Army sergeant Joseph Hunter and a group of other veterans, one from Germany’s armed forces, were arrested for much the same thing, offering “security services” for Colombian drug cartels.

Were worldwide press censorship to ease, the public would learn that America’s drone program is used more for maintaining control of drug production and distribution than terrorism. In fact, according to Russian officials, heroin from Afghanistan, all produced and exported under unspoken but very public approval of US officials, killed over one million people last year.

Drug production, when examined using economic modeling, makes oil racketeering and arms trafficking seem primitive in comparison. No technology is used, fertilizer financed through IMF programs, poppy fields irrigated through USAID programs, heroin processed in German-built labs, shipped on American truck convoys or CIA-leased aircraft, distributed around the world at 10,000% profit.

The CIA has been doing this since the early 1980s and, as every sane person in the world knows, built the drug empire in Afghanistan, the largest in the world.

By “security,” we mean killings, in this case, the group had actually been hired by Americans posing as Colombian drug dealer.

Their job was to murder anyone, including drug enforcement officers, public officials and their family members, even the president of the United States, if asked.

There is a problem with all of this, perhaps more than one problem.

Isn’t this exactly what thousands of Americans, members of the military, the intelligence services, thugs working for USAID and NGOs, have been doing all along.

Political power of the drug

America’s government faces a shutdown, this time because powerful banks and insurance companies feel their profits and political power threatened by health care laws that regulate their long despicable practices.

The members of congress paid by the insurance and health care racketeers were, in dozens of cases, put into office by drug money laundered through offshore accounts controlled by former presidential candidate Mitt Romney.

This marriage of power, the narcotics lobby, the pro-war lobby, particularly McCain, Graham and Lieberman, is also the heart of the Israel lobby.

Before the last election, in meetings with the former head of the FBI’s drug task force, I was given documents outlining ties between top Republican Party officials and the Mexican drug cartels, which are currently terrorizing over a dozen American states.

Gangs of killers employed by these cartels, fully supported by the Republican Party, control most of America’s southwest region and are closely partnered with the LDS (Latter Day Saints) religious sect.

They have set up their own “kingdom,” called “Deseret” inside the United States where they have married religious rule with organized crime.

The Kingdom of Deseret still exists, a region covering nearly 18% of the United States, extending from the Mexican border to the snowy peaks of Idaho.

Citizens of Deseret control much of the FBI and CIA, gambling operations in Las Vegas and have enjoyed over a century of partnership with lawless elements in Mexico.

Extremists among the Deseret hierarchy boast of controlling America’s naval vessels operating in the Mediterranean and Persian Gulf and of their ability to access nuclear weapons.

This is the group that controls the NSA. The NSA’s $4 billion “fusion center” is being constructed in Utah, an LDS-controlled region, “ground zero” for the Kingdom of Deseret.

Background

As early as the 1840s, the LDS terrorized wagon trains heading across the west, kidnapping women, murdering all others.

Within their own community, they maintained control through “Avenging Angels,” assassins that enforced religious doctrine and hierarchical control, though murder. This system still exists.
It was the model for America’s current privatization model, with mercenary groups answerable to extremist organizations and racketeers, all paid for by American taxpayers, running drugs, delivering poison gas to al-Qaeda and orchestrating terror attacks.

In the late 1800s, the LDS or “Mormons” as they are called, fled to Mexico after an unsuccessful war against the United States. There, they formed alliances with bandits and revolutionaries along the border, groups that have now “morphed” into the drug cartels of today.

Those relationships are alive and well today and extend through the heart of America’s financial centers and controlling America’s lower legislative body, the House of Representatives.

Key members of that organization enjoy huge financial benefits from offshore accounts that were made public during the last election, made public and then forgotten.

This power is used in combination with the Israeli AIPAC lobby to support NSA spying and widespread manipulation of financial markets, particularly using the mass of proprietary data gleaned through spying and given to Israel through the recently publicized Memorandum of Understanding.

Call this a “front row ticket” to controlling all financial transactions, technology and intellectual property of the United States, controlling and peddling around the world through open and legalized “piracy.”

Afghanistan

The war in Afghanistan has made the power of the narcotics lobby over America’s military, intelligence and governmental organizations more than obvious.

The narcotics cartels obviously control America’s media.

During the 12 years of American rule, Afghanistan has gone from a nearly drug free nation under the Taliban to a country of addicts and the producer of over 95% of the world’s refined heroin.

Even the United Nations has been warned off, no longer even reporting heroin production in Afghanistan. America talks about its anti-drug efforts though former US envoy, Richard Hollbrooke, openly admitted that narcotics production was key to America’s policy in Afghanistan.

No one has spoken of it since.

Invisible drug empire

Two weeks ago, the US government sentenced an African American soldier, a West Point graduate, to prison for involvement in the heroin trade in Afghanistan. From Navy Times:
“A West Point graduate and former Army captain busted for trafficking heroin from Afghanistan to the U.S. was sentenced Sept. 4 to 10 years in a federal prison.
Saleem Akbar Sharif, 36, of Johns Island, S.C., also agreed to surrender $100,000 in drug profits. He pleaded guilty last year to conspiracy and possession with intent to distribute heroin.”

There is a problem here.

The US government has never admitted that heroin is produced in Afghanistan. They claim only opium paste is produced.

For a West Point graduate to be arrested for making only $100,000 selling narcotics, the crime should have been laziness and inefficiency.

No document has ever admitted any heroin production in Afghanistan, there are no records, and, in particular, not one photograph of any heroin production facility.

The US has never found one, in its “war on drugs.” Similarly, the US never found WMD’s in Iraq or the dozen or more massive underground bunker complexes Secretary of Defense Donald Rumsfeld cited when advocating an American invasion of Afghanistan. In a televised interview with Tim Russert, Rumsfeld spoke of facilities that housed thousands, underground monorails, storage of armored vehicles, entire cities underground. He supplied a graphic, not entirely unlike the cartoon Netanyahu held in his hands while humiliating himself before the UN general assembly in his diatribe about Iran’s nuclear energy program.

But heroin production does exist.

Yet, chemicals used to produce heroin are shipped into Afghanistan at US government expense labeled “dry cleaning supplies.”

The same containers leave through the Pakistani port of Karachi, laden with processed heroin, or so top security officials in Pakistan have told me.

These containers, unnumbered and unregistered, move under the full authority of the United States government.

If you check the Internet, looking for news of anti-drug operations or photographs posted on social network sites, you will never see opium transported, never see heroin processing facilities, never see a container loaded or a plane packed with heroin flown out to NATO headquarters in Brussels to be unloaded.

In a dozen years, there has been no evidence published, none sought and much suppressed.

This is the power of the private and not so private armies that protect and defend the world’s narcotics traffickers, a group which includes political leaders, the US, Canada, Britain, France, Israel, Switzerland, Turkey, certainly Afghanistan but more, so many more.

Heroin trafficking is the lubrication that keeps the wheels of Western politics moving as intended.

Read Full Post »


Alex will also talk with American former newspaper journalist and New York Times best selling author Jim Marrs, and former pilot for clandestine CIA flights, Robert Tosh Plumlee, about illegal arms dealing that might be another “off-the-books” covert operation run by the CIA’s Special Tactical Unit akin to the arms-for-drugs deal in Iran-Contra.http://jimmarrs.com/http://toshplumlee.info/ Money makes the world go round.Nowhere is this motto more relevant than in the shadowy world of smuggling weaponry and drugs, not to mention legal arms sales which all too often lead to modern weaponry falling into the hands of America’s worst enemies.This all becomes evident when dissecting recent events such as the 2011 ouster of Libyan leader Muammar Gaddafi, the death of US Border Agent Brian Terry with weapons obtained through the government’s “Fast and Furious” program, the 2012 murder of US Ambassador Christopher Stevens in Benghazi, and the arming of Syrian rebels attacking the government of Syrian President Bashar Assad

Read Full Post »


Clue To 911 – Shooters At Navy Yard And Aurora Linked To ‘NSA-CIA West’

By Yoichi Shimatsu

Exclusive to Rense

9-23-13

 

The Washington Navy Yard shootings ensure that details of Aaron Alexis’s career with U.S. intelligence agencies will remain inside a deep freezer alongside the dossier on another rogue government agent, the Aurora movie shooter James “the Joker” Holmes. These two villains have striking similarities: Both are linked by an admiration for the ArmaLite AR-15 spray gun and they also suffer bizarre psychiatric disorders, including chronic anxiety, heightened paranoia and strange voices inside their heads.

 

The other feature in common between these now-retired government contractors is their work for the emerging new hub for America’s most advanced espionage capabilities ­ Aurora, Colorado, along with next-door Denver and other sites in the Rocky Mountain region. Alexis had a role in transferring Hewlett Packard network systems vital to NSA intercepts of satellite communications from NSA facilities at East Coast naval bases to Colorado.

 

Buckley airfield in Aurora, home of the Aerospace Data Center, is currently being upgraded and expanded. Its huge golf-ball shaped antennae capture signals from orbiting satellites operated by the National Reconnaissance Office, NASA and the U.S. Air Force, along with data intercepted from the orbiting spacecraft of other countries and private corporations. This intelligence, once analyzed, is shuttled to the North American Aerospace Command in Colorado Springs, which is also the location of the Air Force Academy. (see “Intelligence service being secretive about who, where and when; post-9/11 decentralization” http://www.denverpost.com/search/ci_3431085)

 

In nearby Lakewood, the Federal Center is being remodeled to house the CIA’s domestic surveillance program, which is aimed eavesdropping on U.S. citizens with the goal of psychological profiling of everyone in the borders (http://www.outsidethebeltway.com/cia_moving_domestic_headquarters_to_denver/)

 

Before he opened fire on an audience at a Batman movie, Holmes conducted graduate-level neuroscience research in Denver at the University of Colorado’s Anschutz Medical Campus, which integrates patient care and clinical trials with frontline biomedical studies. (http://www.ucdenver.edu/about/newsroom/newsreleases/Pages/Neuroscience-Program-and-Holmes-information.aspx) His psychiatric disorders may well be linked to the overexposure to powerful electromagnetic radiation from Buckley airfield and other intelligence centers concentrated in the area.

 

Although this unlikely pair followed separate career tracks and never met each other, the two shooters were each involved in secret work for the U.S. government. Since hard facts about this duo of evil-doers are scarce as hen’s teeth, the only method left to investigative journalism, short of a long camping trip in the Rockies, is context analysis and scenario development. While much of this discussion is admittedly speculative due to the thinness of evidence and unreliability of ever-changing media claims, the principal focus here is on the background to the secret work that Alexis did for the U.S. intelligence community. Holmes’ research funded by the National Institutes of Health is given passing mention as another facet of the mountain region’s emergence as America’s “Third Line” of strategic defense and tech-based intelligence gathering.

 

Operational Secrecy on 911

 

The Aaron Alexis story begins as so many other tragic events of our time on September 11, 2001. As told to the British press by his stepfather Frank Calderon, Alexis was riding up the escalator from the subway station below the World Trade Center just as the twin towers were collapsing. For hours, he remained outside the WTC entrance yet miraculously survived the downpour of shattered glass and splintered steel. Then, according to the stepfather’s account, Alexis participated in the rescue work alongside the first respondents over the following three days. (The Daily Mail, Sept. 18, 2013, Interview by Paul Thompson)

 

This story of personal heroism was also told to the Seattle police officers who questioned Alexis in 2004 after he shot the tires of a car. Alexis suspected the construction workers inside the car of being assassins sent to kill him. The gun charges were subsequently dropped by one of America’s toughest police forces, certainly not because of the cock-and-bull tale about WTC patriotism. Security clearances usually get the release from police custody of secret agents in event of common crimes, sparing the CIA the embarrassment of a police report and court case.

 

The New York Job

 

Now let’s move on to the salient points of his role in the WTC disaster. At the time of 911, the Bedford-Stuyvesant-born Alexis resided at the Queens home of his stepfather. Calderon himself was employed at “one of the WTC buildings”, where his night shift normally ended at 7 a.m. After the disaster, the stepfather relocated to Richmond, Virginia, where he has since done unspecified work at a local bank. (Daily Mail, Sept. 18) Judging from his modest station in life, Calderon was not a high-rolling stock analyst tracking Asian stock markets. His night job was probably as a security guard.

 

The security company that watched over the World Trade Center was Stratesec. Its principals until the year prior to the 911 attacks, were Marvin Bush, the brother of former president George W. Bush, and his cousin Wirt Walker III. Stratesec also provided security for United Airlines (two of its jetliners were supposedly hijacked) and for Dulles Airport, where one of the commandeered planes reportedly took off. (This is well-documented by different media, including http://www.historycommons.org/entity.jsp?entity=stratesec )

 

Alexis, according to his stepfather, worked an IT job inside “a building in the WTC complex.” (Daily Mail, Sept. 18) The address is off by a few meters. His stepson was employed by building contractors renovating the Fiterman Hall office tower for conversion into an urban campus of the Borough of Manhattan Community College, part of the CUNY system.

 

The 15-floor building at 81 Barclay Street represented the largest grant ever given to City University of New York. The donor was Miles Fiterman, a lumber tycoon and builder of prefab homes, based in Thief River Falls, Minnesota. The Bush Foundation and the Fiterman family are major donors to the Walker Art Museum in Minneapolis. (Walker Annual Report, 2002)

 

Alexis’s IT job was not anything as flashy as programming or software design. He wired computer hardware as a lowly electrician’s apprentice. (His later job for the Navy was as an aircraft electrician and he did the same type of work for a Hewlett Packard subcontractor at several navy bases. The task is by no means easy. Connecting routers, modems, servers, encryption devices, monitors and phone lines for large-scale customers is more complicated than plugging in personal devices.)

 

Now the curious aspect to this situation is that the Fiterman tower sat cater-cornered (catty-corner in Deep South dialect) to the World Trade Center 7 building. The corners of the two structures were pointed at each other in an ominous fengshui relationship, as hostile as the beaks and claws of a pair of fighting roosters.

 

Conveniently located between the Filterman and WTC-7 was the New York Telephone Building, since taken over by Verizon. All wires led into the N.Y. Tel, and the bundles of phone cables were protected inside underground utility tunnels that are tall and wide enough for easy access by linemen.

 

An Internet installation company, especially in those days when DSL meant coaxial cable or dedicated phone lines, had access to the utility tunnels and links to telephone switch boxes. The CIA through one of its many fronts for wiretapping also had routine access to the NYT system.

 

At a time when not many office managers had a clue about the Internet, a DSL provider could easy install a network of wiring through conduits along the steel girders of the entire World Trade Center. Router closets and inverter boxes placed right on the support beams would attract no attention.

 

Thus, from the demolition control center in the Fiterman could run cables under the utility tunnels beneath narrow Barclay Street into the New York Telephone network feeding into the World Trade Center. Former military electricians, in the uniforms of a friendly Internet provide, then could efficiently install the boxes packed with electric detonators and explosives at critical points of the structure. Using pyrotechnics (fireworks) control software, the programmers would key in the timing sequence for the blast, as planned by an experienced building-demolition expert. The Internet is far more efficient a system for killing office workers and a rival faction inside the CIA than, say, battery-powered timing devices or chemical fuses.

 

The other compelling reason for using Internet-triggered demolition, besides easy unnoticed access to site, is that the blasts had to follow the crash of remotely controlled jetliners into the towers. The so-called hijacking is readily done with the remote cockpit software invented by same Israeli company that designed drone-piloting systems for the Israel Defense Force and also the Waterfall critical infrastructure that protects power plants from their Stuxnet virus. The Internet is a remarkable advance for terrorism, false-flag operations, propaganda preliminary to a political coup and for deceiving the public afterwards. 911 was the best pyrotechnics show ever, outdoing the Reichstag fire.

 

Explosives Inside Filterman

 

When the 47-story WTC-7 underwent a series of explosions and collapsed at 5:20 on the afternoon of September 11, the adjacent Post Office and N.Y. Telephone building sustained no damage. The Fiterman structure, on the other hand, lost much of its south-facing exterior.

 

A strange thing then happened. After the WTC-7 upper floors imploded, only then ­ quite inexplicably ­ did a chunk of the Fiterman Building get blown off and soared over its much-reduced neighbor. Like a mortar round, the fragment flew a distance of 200 meters before smashing into the glass atrium of the Winter Garden, which adjoins the yacht harbor on the Hudson River. (“Aftermath: World Trade Center Archive by Joel Meyerowitz, Phaedon Press 2006, p.47)

 

The role of the Fiterman building in the total schema of 911 has gone virtually unnoticed. The power shot that cracked the glass arch of Winter Garden could not have been caused by the WTC-7 collapse, which exploded toward the opposite direction. The trajectory suggests that the Fiterman’s south face was blown away from inside by a powerful blast from around the 5th floor. The logical deduction is that explosives were being stored inside the Fiterman Building, located opposite WTC-7. (Several maps of the WTC complex are posted online)

 

Wiring the WTC

 

The unoccupied Fiterman building was ideal for a demolition team in need of ample space for explosives, strands of wires, detonators, vehicles, gas masks, a first-aid station, electric power generators, a water supply and temporary living quarters. The south-facing rooms had a direct view onto WTC-7 yet had some degree of protection from a blast from across the street, due to the Telephone Building. (The site of conspiracy-theory debunker James Randi has a forum on the Filterman, which contrary to his objective shows disturbing aspects of its demise. http://forums.randi.org/showthread.php?t=116127}

 

This scenario of an inside job better explains why Aaron Alexis was at Ground Zero on 911. Besides the subway station below the twin towers, there was also a maze of underground walkways that enabled him to pass underneath the WTC complex without risk from flying shrapnel, smoke and molten metal raining down onto the plaza. Not a single member of the firefighting and emergency team has yet come forward with recollections about a tall young black volunteer toiling in the dust for three days straight after the disaster.

 

The likelier reason for his brief presence is that Alex was ordered to conduct surveillance of the damage done to the towers and then inspect the temporary cables to WTC-7 from the covert operations center inside the Fiterman across the street. Those two extra days, September 12 and 13, were probably spent on evidence-removal duty, necessary tasks such as rolling up detonator wires and disposing of incriminating residue from Ground Zero. Much of this tedious work was done by flashlight at nighttime, when emergency crews unfamiliar with the underground passages dared not enter the smoking hulk.

 

Enigma Wrapped in Mystery

 

Soon after 5 p.m. on September 11, the CIA clandestine center in New York, which organized spying on the UN headquarters and monitored Al Qaeda worldwide, was blown to smithereens, killing key operatives investigating links between terrorists and high-ranking politicians. 911 truthers point to the scientific fact that debris from the twin towers could not possibly have caused the implosion of the WTC-7 intelligence center, which housed offices of the CIA and Secret Service. (although a subject of dispute by debunkers, it is now bwidely documented that the CIA and DoD shared the 25th floor, as cited in WTC-7, Chapter 5, by Gileanz, DiPaolo, et al.; a list of articles can be found at http://www.911review.org/Wiki/Building7Collapse.shtml)

 

Frank Calderon, who probably recommended the next-door Fiterman job to his stepson, and finagled a position with typical New York nepotism, was not among the casualties of WTC-7 blast, even if it is highly probable that he worked at that very site as a security guard, because otherwise he would have identified the building number in press interviews.

 

(Out of consideration for the family’s privacy and peace of mind, it must be stated here that these scenarios are hypothetical, limited by the scarcity of evidence, and done solely for the public benefit in trying to unravel an important chapter of recent history. That the pieces of this mystery fit together as tightly as a jigsaw puzzle is not grounds for harassment or annoying phone calls to the family or Navy Yard survivors.)

 

While the wreckage at Ground Zero was being slowly demolished by work crews, the exterior of the Fiterman structure was painstakingly wrapped with tarps as if its interior had to hidden from sight. Only much later was the structure demolished without a trace of the workmanship that had gone on inside. One thing is certain and that’s the Bush family, the Fitermans and Larry Silverstein won’t be discussing any of this in public.

 

The Missing Years

 

From autumn 2011 until his service with the Navy Reserves started in 2007, Aaron Alexis vanishes into thin air, on record at least. One of his personally traits that acquaintances mention is that Alexis never talked much. That goes with the training for a security clearance. Whatever work he may have performed during those six years would later qualify him to gain a higher-level security clearance at Navy communications centers that provide raw intelligence to the NSA and CIA.

 

One outstanding clue to those missing years was his fluency in the Thai language, which enabled him to chant sutras more smoothly than most native Buddhists. (Taunton Daily Gazetter, Mass., as reported by AP) During the early phase of the war on terrorism, Thailand was a major transit point for defense contractors heading for Central Command bases in the Persian Gulf and special-forces camps inside Pakistan, Afghanistan and Iran.

 

The massive presence of contractors and intelligence agents in Thailand was apparent during my volunteer stint immediately after the 2004 Christmas tsunami. According to Thai sources, the death toll of foreign intelligence personnel began with the drowning of some 350 American uniformed servicemen when the tsunami hit the NSA listening post inside the Thai Navy’s 3rd region headquarters at Ban Thap Mo base on the Andaman Sea, just north of Phuket. (reported in a column by Kavi Chongkittavorn, The Nation newspaper, Bangkok)

 

More details emerged from local boat captains after they heard about my non-biased reporting from Kashmir and along the Afghan border. These small-craft pilots on the Muslim-predominant coast told me that some 3,600 American, British and Israeli defense contractors were killed by the tsunami after indulging in a holiday all-nighter on Patong Beach in Phuket. In Krabi, the Israeli Defense Force lost so many of its naval divers that its navy had to close the Gulf of Aqaba outside Eilat port to foreign ships for many months thereafter. Some 200 American mercenaries living in Bangkok were apparently buried in secret graves on the road to Phuket, which is why the Pentagon demanded the bodies of all tsunami victims be disinterred for identification. Was foul play involved? What does one expect from pirates?

 

The U.S. Navy dispatched four rapid littoral combat vessels from Hong Kong to Phuket, “the fastest ships ever seen”, according to the local pilots. On the fabled island of PhiPhi Don, location of the Leonardo DiCaprio film “The Beach”, Navy helicopters attempted to land but were chased off by local pirates armed with guns and machetes. Later, after all the safety deposit boxes in hotels were broken open and emptied, the helicopters airlifted out every foreign male corpse with a strong physical built to the Navy vessels, which are equipped with refrigerated morgues, for DNA identification in Yokusuka, Japan.

 

Up to that moment, the number of servicemen killed by the tsunami far exceeded the casualties in the Afghan War. Not a single computer or memory drive of any Western serviceman ever surfaced, and from what I could gather at the local bazaar and from an Israeli intelligent agent planted inside an NGO relief group, all the military hardware was sent toward the Red Sea via Malaysia and Indonesia. As the local boatmen put it, “Allah is Great”. For Bin Laden and his paymasters in the Gulf States, it was a post-Christmas shopping spree.

 

The wipeout on Dec. 26 showed the CIA to be boys in diapers. During the previous 18 months, a crew of CIA technicians installed any Agency communications center at a plush resort in the Krabi area. The reason is that the listening post at Ban Thap Mo was a joint-intelligence center, partially overseen by the Royal Thai Navy, to keep watch over Chinese and Indian naval activities on the petroleum-rich Andaman Sea. The super-secret Krabi spy facility was aimed at spying on Shell and BP operations in Sumatra, along with Petronas in Malaysia, and monitor their influence on the Thai and Burmese militaries. The CIA was determined to put the oil and gas fields of Indonesia, Malaysia, Thailand, Malaysia and India under the control of U.S. energy companies.

 

Was Aaron Alexis work for the CIA on the Andaman project, or was his work in Thailand restricted to monitoring the Muslim insurgents in south Thailand, Malaysia and Indonesia, which led to the arrest of top leaders in the Qaeda-linked Jemaah Islamiya, which bombed hotels in Jakarta.

 

There is one other CIA posting in Thailand that could use his technical skills then, and that is the rendition airfield and interrogation center at Udon Thani, the Vietnam-era airbase for B-52 bombers, in the Isaan region of northeast Thailand, run under the cover of a Radio Free Asia station. RF Asia was expanding its presence as a Internet news resource, right up his alley. This amazing fluency in Thai would have been seen as a job asset for the CIA. A point to note, here, is that the Alexis tire-shooting incident occurred in 2004 in Seattle, three years before he was seconded to the Navy, and the rendition controversy that rattled the Bush administration in 2006 may have been a factor for this transfer.

 

Despite the best efforts of the CIA and NSA, the Christmas tsunami made it clear that the war on terrorism was already lost, regardless of divine will or the devil’s doing. Arrogance, corruption and ineptitude had scuttled the post-911 crusade.

 

As for Aaron Alexis, many of he acquaintances including Thai Buddhist friends have remarked that he constantly carped about insufficient funds and race discrimination. Yet at Christmas season 2004 he was lucky to be a lower-ranking contractor stuck on some remote U.S. base in a desert or in amazingly boring Qatar or Bahrain rather than partying on the beach at Phuket. Sometimes a bit of bad luck can be a blessing in disguise. Though I never saw him there, if Alexis did make it to south Thailand for the rescue and recovery work, it was no paradise. The stench of bloated decomposing corpses was hideous, clinging to one’s skin, hair and nostrils for weeks after.

 

Working for the NSA

 

By the end of 2007, Alexis was living in the USA. Readjusting to the States can be a huge letdown and even a culture shock after making as much as a thousand dollars a day as a defense contractor in the Persian Gulf. In Dubai, which boasts the longest bar in the world, you’d see the Americanos just arrived from Baghdad and Doha stumbling in at about 11 p.m. to splash out on single-malt whiskey or a Guinness stout and enjoy the eye-candy from Kazakhstan, Uzbekistan and other stans passing themselves off as bleach-blonde Russians and easygoing Ethiopian ladies posing as exotic Eritreans and Somalis. Nothing’s real in Dubai, the land of mirages.

 

It’s all part of the pecking order, with Lebanese and Iranian women at the top of the desirables list down on through the former Soviet ranks, then the Chinese and last but least, the bottom-rung Eurotrash tourists. Reverse racism in the Gulf, under which brown, black and yellow beauty fetch more attention than white, is probably a reason why Aaron Alexis was so embittered on his return to the racial rightside-up United States.

 

The Rising Cost of Living

 

Alexis joined the Navy Reserves in 2007 and served until early 2011. Never promoted, he was a aviation electrician’s mate third-class, a grade with pay levels as low as the rank. The Navy Reserves is definitely not an officer-track opportunity or road to self-enrichment. Yet, during those four years, Alexis rented an apartment in Oak Hills, a high-end gated neighborhood of Fort Worth (Guardian, Sept.17) and on his many travels stayed at luxury hotels, including the Marriot in Providence, Rhode Island, which is favored by much higher-ranking officers.

 

What was the secret to a luxury lifestyle on a sailor’s budget? Answer: The CIA. The Agency routinely embeds its intelligence agents into the military Reserves, which provide weapons training, unlimited ammunition, base privileges, cheap beer, fast food, access to secure communications and free air transport to practically anywhere in the world. As a result, Navy and Marine Reserve units acting as the CIA paramilitary force often operated with better transport, superior firepower, more air cover and keener intelligence than regular Army units. (These points are based on my interview of a Marine reservist-CIA agent, who exposed the torture at Abu Graibh.) The Navy-Marine intranet, maintained by Hewlett-Packard, is the world’s largest institutional communications network. Bandwidth is never a problem.

 

While not embedded in the military, Edward Snowden was a dual CIA-NSA employee because of his assignment to human intelligence and on-the-ground covert operations in Geneva, Switzerland, along with eavesdropping. Aaron Alexis, in contrast, wore three hats ­ NSA, CIA and Navy Reserves – thereby earning a sizeable pay package that allowed extended visits to Thailand and plush accommodations wherever he went.

 

Hop, Skip and Jump

 

A review of his movements shows that Alexis hops, skips and jumps from base to base on assignments for the NSA and CIA. The perks of working for several intelligence agencies include time off for language classes and extended vacation breaks en route to distant jobs. For a short while, at least, Aaron Alexis was something of a James Bond.

 

The following are some of the locations where he worked. (Information on these military facilities can be found at GlobalSecurity.org and Wikipedia)

 

Fort Worth: His home base was the Naval Station Fort Worth Joint Reserve Base in White Settlement, Texas. Its landlocked airfield is used by fighter squadrons of the Navy, Marines and Air Force Reserves. More important, the base is headquarters for the Naval Reserve Intelligence Command, which along with its far-flung spy operations has also earned a reputation for breaking encrypted codes. There in Texas, the CIA and NSA collect and analyze data and analysis from their Reservist spies aboard planes and ships and with infantry brigades around the world. (White Settlement is where Alexis worked after leaving the Reserves as a waiter at a Thai restaurant, meditated at a Buddhist temple and was disappointed by a sweetheart. See the Daily Mail, Sept.18)

 

Seattle: There are no official disclosures about Alexis’s work assignment in this West Coast city where he had a run-in with the police over shooting out tires. Nevertheless his tasks are readily surmised. Naval Reserve Intelligence Area One/Northwest is based at Whidbey Island, site of the racy Richard Gere movie “An Officer and a Gentleman”. As an aircraft electrician’s mate, his task would have been to upgrade the on-board computers and encrypted radio transceivers on the Prowlers, Growlers and Aries jets, which are all used for electronic warfare. Pilot training here involves all four services across the Pacific theater.

 

(The narrow-apeture radar extensively used around the Puget Sound’s numerous naval facilities along with radar-suppressing electromagnetic pulses probably accounted for the severe psychological disorders Alexis suffered, including anxiety, paranoia and hearing voices inside his skull. (While passing the Whidbey area by car twice in June 2013, my Casio G-shock watch malfunctioned and the radio went dead.)

 

Newport: The naval station on the Rhode Island shore is home to 50 Reserves units from all four services. The base is also headquarters for the Naval Security Force, which trains military police for occupation of foreign countries, including Iraq, Afghanistan and other territories. The Naval War College at this base provides a highly secretive training program for Navy Reserve Intelligence officers, and Alexis would have upgraded its Internet-based communications and learning network.

 

Bangkok and Hua Hin: The Joint U,S. Military Advisory Group, located near Lumpini Park, Bangkok, provides weapons and training to the Thai military. Alexis was mainly assigned to Hua Hin, a small port on the Gulf of Thailand, about an 80-minute drive south of Bangkok. The Thai navy forces have the unique duty there of protecting the residence of the King of Thailand, and also for seagoing interdiction against Muslim insurgents in the southern provinces along with signals-intercepts and intelligence gathering on jihadist groups operating in the south and adjoining Malaysia. (His Buddhist faith meant that Alexis was a low security risk in the war as compared with a follower of Islam. BTW, I formerly taught media studies at a university in Hua Hin, where I have observed naval exercises from the beach.)

 

Ichigaya, Tokyo: After leaving the Reserves in early 2011, Alexis was likely assigned by his subcontractor boss to the Hewett-Packard offices in Tokyo’s Ichigaya district, the headquarters of Japan’s Self-Defense Force and its anti-ballistic missile command. The CIA and NSA spy on their close allies. Trust is the hallmark of a defeated empire.

 

Fingers on Top Secrets

 

Whatever the corporate-controlled news media is reporting, Alexis was not a morose loser and misfit. In 2011, he enrolled as an online student to earn a Bachelor of Science degree in aeronautics at Embry-Riddle Aeronautical University in Fort Worth. (Guardian, Sept. 17) Anyone contemplating suicide amid mass murder is not going to be studying aerodynamics, navigation, flight controls and the finer points of aircraft engineering.

 

After leaving the Navy Reserves, his new task with The Experts, an IT subcontractor based in Alexandria, Virginia, was to disconnect the Hewlett Packard signals-intercepts hardware in the Washington DC area, which includes the National Security Agency headquarters in Fort Mead, Maryland. The mainframe computers and servers were being relocated to the new NSA West center at Buckley airfield in Aurora, Colorado.

 

This removal of equipment and personnel to the NSA-CIA centers in Colorado was ordered after series of post-911 debates and studies on the increasing risks of concentrating America’s core intelligence assets on the East Coast, or for that matter along the West Coast. With the same strategic considerations that guide China’s military, which puts its nuclear and missile forces deep inside the interior of continental Asia, America’s intelligence chiefs decided to reposition vital electronic intelligence-gathering capabilities to the Rocky Mountain region in the American heartland.

 

Swarming the Human Mind

 

Among their array of evermore advanced intelligence tools, the Pentagon and NSA have cooperated with the Israel Institute of Technology (Technion) on a Hewett-Packard Israel project called The Swarm. Led by Ruth Berg, a former researcher at MIT and NASA Jet Propulsion Lab, this image-based software assembles the files, emails, Twitter messages, voice calling and transactions of target individuals into an evolving map that can predict their innermost thoughts and future decisions. The Swarm is essentially the precognition program depicted in the Tom Cruise movie on pre-crime prevention. (www.hpl.hp.com/israel)

Precognitive mapping is also aimed at predicting hidden psychological disorders and criminal (disobedient) tendencies. The Swarm’s diagnostic algorithms are relevant to the neuroscience research of James Holmes, whose studies in molecular biology focused on the biological sources of non-predictable (disorderly, creative) behavior. Toward these goals of total mind-control, President Barack Obama early this year released $1 billion in funding for a national Brain Initiative. (http://www.whitehouse.gov/the-press-office/2013/04/02/fact-sheet-brain-initiative) Its key U.S. private-sector partner is Eli Lilly, the pharmaceutical company that produced LSD for the CIA’s MK-ULTRA program in the 1960s. (see US patent 2997470, Richard P. Pioch, Purdue University, “Lysergic Acid Amides “, 1956-03-05)

 

Alexis was prescribed a sedative at the VA hospital in Providence after complaining about his mental-health issues and later went to the VA in Washington DC for a refill. (Navy Times, Sept.18) The psychiatrists at the NSA and CIA probably viewed Aaron Alexis as a dedicated and loyal agent who was starting to show signs of a nervous breakdown. He was not exceptional. The only thing that made him stand out was the espionage vulnerabilities associated with his work.

 

Thousands of people worldwide are suffering from the same symptoms, which can be attributed to microwave telecommunications networks, aperture radar and electronic warfare technology, including voices shouting commands to commit violence, the unbearable torture of screeching noises inside the skull, short-term memory loss and blackouts. (My extensive interviews with a Japanese imprisoned for stabbing a British professor who specializes in telepathy theory led to the correlation of his disorders with the introduction of microwave transceivers on for the Motorola digital mobile phone service to U.S. military bases in Okinawa and the British Telecom’s experiments with the TETRA system in London.)

 

These symptoms of electromagnetic-related psychological disorders are usually wrongly diagnosed as PTSD, resulting in drug treatment with antidepressants that eventually worsen the condition. (there are many critics among veterans group; a short summary is ast http://www.nbcnews.com/id/43994382/ns/health-health_care ) At first the supervisors will shrug off incidents like the Seattle tire shooting, sweeping the problem under the carpet with excuses, for instance, the errant serviceman’s overdrinking or having the blues over a sexual affair gone sour. As the symptoms worsen and become no longer treatable with drugs, the institutional response is to find a way to dispose of the victim.

 

Any electronics technician who is conversant with the codes, hardware and software used by intelligences agencies is either a prized asset or a serious liability. There can be no in-between.. For his overseers, transferring Alexis to the new HP operations at NSA West in Aurora was a high-risk proposition. The time had come for preventative measures.

 

Termination Papers

 

Despite the high salary, much of it untaxed, the double identity that comes with an intelligence career can make for a lonely existence. Every one of his social contacts would have been routinely investigated and vetted to reduce the potential for espionage and a subsequent security breach. Thus, Alexis avoided family visits, which accounts for why his sister’s husband had never met him in person. For that same reason, immediately after the Washington Navy Yard incident, the controlled mass media intensively interviewed his circle of Thai friends in Fort Worth to determine whether any secrets had been spilled during meditation retreat, an espionage technique used by the Aum Shinrikyo sect on Soviet weapons scientists. (A series of articles was published in the Japan Times Weekly, based on reports from the National Police Agency and interviews with Aum members,)

 

After his visit to the VA hospital in Newport, as Alexis showed worsening signs. His superiors would have come to a final decision. To allow him to be confined in a sanatorium or move abroad to Thailand was out of the question, due to the risk of discovery by civilian doctors, other patients, attorneys and foreign spies.

 

A man who knows much too much and cannot be helped might be deployed in other ways, as a fall guy for extrajudicial executions. On the morning of September 16, witnesses were reported in many media outlets as seeing two or three gunmen, one of them a black man of about 50 years of age, an unmistakable difference from the 34-year-old Alexis. The shorter stockier gunman was dressed in green fatigues and fired an AR-15.

 

When the FBI learned within several minutes that Alexis had rented the ArmaLite for two days only but did not purchase one from a gun store near his stepfather’s residence in Virginia, the AR-15 was dropped from media reports like a hot potato. The story was changed to a sawed-off Remington 12-gauge shotgun, a weapon that lacks an individual ballistic signature. Unlike a rifle bullet, buckshot leaves no traces on its pellets or inside the shotgun barrel.

 

Buckshot is, of course, not the ideal ordnance for a mass killing, as its lethality and accuracy are limited to close range. So far, no stories have emerged of Navy Yard victims with their heads blown off or intestines spilling out. Most were shot at some distance. The higher-pitched sounds of firing were reattributed to a pair of handguns he allegedly removed from two of his dead victims. It all adds up to an incoherent script, sloppily directed theater and poor gunnery, which in fact was not so imprecise. Most of the scriptwriters need to weeded out.

 

Lethal Price of National Security

 

Was the content of the brains of one man worth the killing of a dozen people? It’s worth far more than that to the intelligence services and their political masters. The elimination of a bunch of civilian employees nearing retirement is, if anything, a cost-saving measure for a military pinched by budget sequestration. Let the insurance companies carry the burden and save the money instead for another aircraft carrier. National security is sacrosanct, random people are expendable. As for the moral cost, nobody is innocent.

 

It is a fair assumption to suggest that among the dozen fatalities, one or more of the victims employed at some top-secret project at the Navy Yard was or were overdue for an exit. It is the proverbial case of killing two, three birds with one stone.

 

Why then has the CIA not yet terminated James Holmes as was done to Aaron Alexis? The neuroscientist remains alive because his scientific concepts are still marginally useful to the spymasters. Once the inquisitors are done squeezing out every drop of knowledge, the Joker, too, will meet his Maker. As precognition arrives with The Swarm, people will soon learn to become predictable at all times. Remember always: Silence is golden, obedience is platinum ­ or you, too, could end up as collateral damage inside The Yard.

 

Yoichi Shimatsu, a Hong Kong-based science writer and former editor of the Japan Times Weekly in Tokyo, has done investigative journalism on intelligence affairs in the Asia region over several decades.

 

 

Read Full Post »


CIA ATTACKS MALL SHOPPERS?

On 21 September 2013, an upscale mall (photo above) became a war zone in Kenya.

This mall attack is partly about oil, oil pipelines, naval bases and the US struggle against China.

Samantha Lewthwaite is linked to the London Tube Bombings of 2005, and to a bombing campaign against tourist hotels in Kenya. Her father was a soldier in the UK military. SAMANTHA OF MI6?

Mossad, the CIA and MI6 are heavily involved in Kenya.

Kenya has become friendly with China.

A few years ago, the Chinese defence minister agreed to modernise Kenya’s armed forces.

(The sound of silence)

China’s trade with Kenya has been rising.

The leaders of Kenya’s Mau Mau, who fought the British, were given military training in Israel. Kenya has many Israeli businessmen and a Mossad presence. In 1998, the US embassy in Nairobi was bombed. WSWS wondered about links to Mossad  (Questions mount in Kenya / Israel and Africa) :

In Kenya, the Chinese have invested in mining and offshore oil exploration, plus some big infrastructure projects, such as new bypasses around Nairobi.

(The sound of silence)

Kenya is the base for US intelligence operations in East Africa and the Horn of Africa.

(Kenya: post-election violence continues)

Michael Adebolajo released from Kenya, with the help of MI5? The London Woolwich ‘terrorist’ Michael Adebolajo is thought to have been working for MI5-MI6 for many years. When the police in Kenya arrested Michael in 2010, MI5-MI6 are said to have organised his release. Michael Adebolajo was arrested in … / ADEBOLAJO WAS PAID BY MI6

There are newly discovered oil reserves in Eastern Congo. The oil is to be brought by pipeline through Kenya to Mombasa on the coast.

China is currently involved in major highway projects in Kenya.”

Kenya: post-election violence continues

Two Canadians among deadCurrently, a Briton called Jermaine Grant is about to go on trial in Kenya, charged with organising a bombing campaign.

The Somalian terrorist group al-Shabaab, which has links to the CIA’s Al-Qaeda, has now claimed responsibility for the 21 September 2013 Westlands shopping mall attack in Nairobi, in Kenya.


Al Shabaab, reportedly working for the CIA.

Somalia has oil and both China and the USA/NATO want to grab this oil.

Kenya is interested in the oil. Kenya has troops in Somalia.

UK AID MONEY GOES TO AL QAEDA IN SOMALIA


Al Shabaab

In the Westlands shopping mall, there are at least 50 people dead and more than 150 injured.

The “terrorists” stormed the Westgate Mall and sprayed shoppers with bullets.
This is similar to the CIA’s attacks in Belgium, India…

Kenya – acting scared. http://www.dailymail.co.uk/

In Belgium, in the mid-80s, hooded gunmen walked into crowded supermarkets and began firing at shoppers.

The massacres were later discovered to be linked to Operation Gladio, which was a CIA-NATO enterprise.

“The Supermarket massacres occurred during the period when the U.S. was pushing a plan to base the Euro-Missiles (nuclear-tipped Cruise missiles) in different European countries…

“The Belgian Parliament, which investigated the incidents, felt that they were another attempt to sow confusion and fear among the populace, thereby generating public outcries for a law-and-order government which would be amenable to the Euro-Missles.”

http://www.etext.org/Politics/Autonome.Forum/Antifa/gladio

Kenya mall September 2013. http://www.dailymail.co.uk/
In India, the Mumbai Attacks of 2008 involved ‘white men’ who may have been ‘mercenaries’ employed by the CIA.

Mumbai Attackers were ‘Hindus’ and ‘White Men’

The Mumbai attacks were planned by the American called David Headley, who worked for the USA’s Drugs Enforcement Administration.

Headley admitted working for the CIA.

DAVID HEADLEY – ‘DRUG DEALER AND CIA AGENT’

The Kenyan shopping mall. The operatives in the CIA’s Operation Gladio were told they “had to attack civilians, the people, women, children…” http://www.dailymail.co.uk/
The people who attacked the Kenyan shopping mall are described as follows:
“The attacker they arrested was a Kenyan Muslim convert.”

“They spoke something that seemed like Arabic…”

“One had dreadlocks.”

Read more: http://www.dailymail.co.uk/

In 2002, it was reported that ‘al Qaeda’ had bombed the Israeli Paradise Hotel (above) at Kikambala Beach near Mombasa.

13 Kenyans died.
It looked like an Israeli false flag operation.

Before bombings…  / Kenyan hotel bombs the work of the security services?

DESCRIPTION
Tyler Hicks/The New York Times

COMMENTS from readers:

1. The photographer Tyler Hicks always seems to be there to capture the moment.

Witness to a Massacre in a Nairobi Mall

That means psyop.

What is the chance that this top notch photographer would be in the mall to “record the event”

Tyler Hicks, who always somehow seems to be at the hottest of hot spots and war zones when things explode, did it again today, improbably being inside the mall in Nairobi when the bomb went off.

Nairobi mall. www.dailymail.co.uk

2. “We knew the shopping center is owned by Israelis and renowned as a place where many Israelis hang out,” Lopez told Maariv.

“Four of the restaurants there are also owned by Israelis and many Israelis are employed in the place.”

Israel’s Deputy Ambassador to Kenya Yaki Lopez and the embassy’s security officer arrived early in the afternoon Saturday at the command center of the local security forces, following the first reports about the attack.

3. Can this destabilization be linked to the recent discovery of a huge underground water reserve?

BBC News – Kenya aquifers discovered in dry Turkana region

4. Also the killings of Brit Ex-pats linked to the goings on around the election because Kenyatta won.

Lots of bad blood there with the UK establishment.


Frank Lowy

5. shirlz007 comments:

A WESTFIELD SHOPPING CENTRE – Owned by none other than Frank Lowy!

‘these global shopping centres you own seem to attract a suspiciously unusual amount of terrorist activity Frank!’

Fifty days before 9/11, Larry Silverstein’s Silverstein Properties and Frank Lowy’s Westfield America secured a 99-year lease on World Trade Center Buildings One, Two, Four and Five. Silverstein already owned Building Seven.

Silverstein and Westfield America insured the WTC complex for $3.55 billion, but after the attacks of September 11 lodged a claim for $7.1 billion on the premise that each plane collision constituted a separate act of terrorism, doubling thepayout.

-11 September 2001: New York, the WTC complex buildings 1, 2, and 7 along with Westfield Hotel were ruined in the 9/11 attacks, and consequently about $5.4 billion went into the pockets of Lowy and Silverstein.

-21 September 2005: Westfield Mall in Perth, Australia, bomb threat.


Frank Lowy reportedly owns Marriott hotels

-17 May 2006: Westfield in Woden, Australia, bomb threat.

-21 July 2007: Court house adjacent Westfield Centre Derby, England, bomb threat, which caused evacuation of Westfield premises.

-01 March 2008: Westfield Old Orchard Mall, Skokie, Illinois, bomb threat.

-20 April 2009: Westfield Hotel Annapolis, bomb threat.

-20 September 2008: Marriott Hotel in Islamabad, Pakistan, bombing.

-17 July 2008: Marriott Hotel in Jakarta, Indonesia, bombing.

-August 2012: London… wait, that one didn’t quite happen for ya did it Frank!)


In 2011, Kenya’s Raila Odinga and Israel’s Benjamin Netanyahu promised to strengthen security ties. Odinga was defeated in the 2013 presidential election in Kenya.


6. “Israeli agents” were involved “in the siege”…

“The Israelis have just entered”… a Kenyan security source told AFP….

“Kenyan Vice President William Ruto has asked the International Criminal Court to delay his trial for crimes against humanity over deadly 2007-08 post election violence because of the mall standoff, his lawyer said…

“Foreign security agents – from Israel as well as the United States and Britain – were also seen at the complex throughout the drama…

Israeli forces in Kenya battle in mall.

 Somalia. The war is about oil and naval bases… www.globalresearch.ca

7. Here are the addresses of the Israeli and US embassies to Kenya.

You can politely ask the representatives of these nations what they know about the terrorist attack.

Israeli Embassy:
Bishop Road (near the intersection with Second Ngong Avenue).
Nairobi

US Embassy:
United Nations Avenue
Nairobi

Both are just a short walk from Westgate Mall on Mwanzi Road.

Or ask the embassy staff at their places of residences. No doubt Russian and Chinese diplomatic staff know their locations. The wealthy expats areas are small and close-knit. And probably not very well guarded either…

Ask them if they’ve ever heard of the NATO “Strategy of Tension”. Or read the legal transcripts in the aftermath of the Bologna train station bombing.

Also ask their opinions on Chinese oil exploration in Somalia, and recent foreign partitioning of Somalia into controllable fragments such as Jubaland

 
An action which benefits both Kenya and Ethiopia. Oh, and Western geostrategy and oil interests.

Northern Somalia would also be an excellent location for Chinese naval basing to protect China’s economically critical sea lines of communication for oil transport. 

 

Unless Somalia were fragmented, weakened and run by CIA-backed warlords.

And maybe you can ask why the gunmen didn’t take a leisurely stroll down to the Israeli and US embassies and unleash hell there, instead of killing innocent people.

Hmm, and why were those Israeli soldiers there? Can Kenyan special forces not handle a ragtag bunch of bloodthirsty amateurs?

And isn’t it unusual how Al Shabab’s Twitter updates are in fluent English.

 

Read Full Post »

Older Posts »

Follow

Get every new post delivered to your Inbox.

Join 986 other followers

%d bloggers like this: