Feeds:
Posts
Comments

Posts Tagged ‘CIA’


This is a small section of a long talk delivered by Robert Anton Wilson in Los Angeles in 1988.

Who was Robert Anton Wilson?

Writer, novelist, great untangler of conspiracies.

Here we learn how the CIA, the Vatican and Organized Crime play nice with each other when there is drug money to be made – and how many of the players in the US drug trade also appear to have been involved in the JFK assassination.

Read Full Post »


Interstate Batteries.com

Viktor Yanukovych, the Ukrainian ousted president

Ukrainian deposed President Viktor Yanukovych says the US Central Intelligence Agency (CIA) is provoking bloodshed in the country by sanctioning the use of weapons against pro-Russia protesters.

Speaking on a Russian television station late on Sunday, the ousted president said the United States authorized the new government in Kiev to use force to crack down on protesters in the country’s east.Yanukovych also warned that Ukraine’s interim officials have taken the country to the brink of a civil war.

He noted that CIA Director John Brennan met with Kiev’s new leaders in person and “in fact sanctioned the use of weapons and provoked bloodshed,” in Ukraine.

Yanukovych added that in the event of any bloodshed, the new interim officials of Ukraine as well as the US administration will be held responsible.

He also urged the country’s security forces not to obey orders and restrain from shooting at people.

Meanwhile, new reports say that at least three people have been killed in clashes between security forces and protesters during what Ukraine’s Interior Minister Arsen Avakov calls an “anti-terrorist operation” in the eastern town of Slavyansk.

Political crisis erupted in Ukraine in November 2013, when Yanukovych refrained from signing an Association Agreement with the EU in favor of closer ties with Russia.

Tensions between the Western powers and Moscow heightened after Crimea declared independence from Ukraine and formally applied to become part of the Russian Federation following a referendum on March 16, in which nearly 97 percent of voters in Crimea chose to rejoin Russia.

On March 21, Russian President Vladimir Putin signed into law documents that officially made the Black Sea peninsula part of the Russian territory despite condemnation from the West and the new Ukrainian government.

The move sparked angry reactions from the US and the European Union, both imposing punitive measures against Russia.

http://www.presstv.ir/detail/2014/04/13/358453/cia-provoking-bloodshed-in-ukraine/

 

Read Full Post »



Rear Admiral Richard Butler, the commander of the Guantanamo concentration camp. New Scientific Evidence That Hitler Escaped Nazi Germany / FBI Opens Files Proving Hitler Went To Argentina With Help From The Director Of The OSS Himself-Allen Dulles

Guantanamo proves that the USA is run by Nazis.

These Nazis of course have Zionist and Mafia connections.

A Briton who was ‘cleared for release’ in 2007 is still imprisoned at Guantanamo.

He has never been charged with any crime.

http://www.dailymail.


Countries fully controlled by the CIA

Obama appears to have lied when he said that he was going to close Guantanamo.

In Guantanamo, ‘beatings are common place’.

Two former Guanatanamo guards were recently charged with raping female subordinates.

http://www.dailymail.


CIA torture – used to mind control victims and turn them into tools of the CIA.

No American is safe while the Nazis run the USA.

more here

Read Full Post »


Not really news at all, but: CIA reportedly employed several operatives, warlords and militant leaders deeply involved in Afghan opium trade

Reports say US-led NATO forces are taxing the production of opium in the regions under their control.

20 Mar 2014 A senior western audit officer has raised fresh concerns that US funds meant to help pay Afghan police salaries may instead be going to “ghost workers”. “I am writing to express my concern that the US may be unwittingly helping to pay the salaries of non-existent members of the Afghan National Police,” John Sopko, the special inspector general for Afghanistan reconstruction wrote in recent letter to top US-led NATO generals… Afghan officials accuse the US of channeling funds to the Taliban militant group. Afghan lawmakers say American helicopters have recently delivered several shipments of small arms and heavy weapons to the militants in southern provinces. Senior officials in Kabul have also demanded an explanation from Washington over its aid to the Taliban…In addition to that, the Afghan counter-narcotics officials say foreign troops are also earning money from drug production in Afghanistan.

[Darn those pesky deficits that the Teabaggers/DemocRATs whine about 24/7! And yet: There seems to be a bottomless pit of US tax dollars available to protect the CIA's heroin trade, arm the Taliban, fund the Nazi coup in the Ukraine, pay for IsraHell's Iron Dome, and provide even more tax breaks and bl*w jobs for Exxon Mobil.]

Read Full Post »


You’ve heard that there’s a big battle between the CIA and Congress over the CIA spying on the Senate Intelligence Committee’s review of documents related to the Bush-era torture program.

Many are calling it a “constitutional crisis“. House Oversight Committee Chairman Darrell Issa calls it potential “treason“.

The congress members complaining about spying by the CIA are right, of course.

But they are hypocrites. Specifically, these same congress members  didn’t raise a peep when the government was spying on the people … and instead defended the government’s mass surveillance at every opportunity.

There are hundreds of thousands of Google hits for the search term “Hypocrisy CIA Senate Feinstein“.

High-level NSA whistleblower Bill Binney, Edward Snowden, a very high-level former CIA officer, a former FBI agent and many others are all slamming Congress for the hypocrisy

A corrupt CIA is certainly part of the problem.   After all, the same guy who was the lawyer for the CIA torture unit – and who was mentioned 1,600 times in the Senate intelligence report on torture – is now the chief counsel for the CIA … the guy working so hard to make sure the torture report is never released. (He was also involved in the destruction of tapes documenting CIA torture … discussed more fully below).

And don’t let Obama fool you: The White House is a big part of the problem as well.

Obama has for years prevented the Senate Intelligence report on torture – what the CIA’s spying is all about – from being declassified.

Glenn Greenwald tweets:

Could someone remind me who appointed [CIA director] John Brennan and to whom he reports? Having trouble finding it in most discussions ….

Obama appointed current CIA-director John Brennan, who – before the appointment – had expressly endorsed torture, assassination of unidentified strangers (including Americans) without due process, and spying on all Americans, and got caught in numerous lies related to national security and defense.   (Indeed, Brennan insisted that he be sworn in with a copy of the Constitution which didn’t include the Bill of Rights.)

The White House has also withheld 9,400 documents from the Senate’s CIA torture investigation. McClatchy reports:

The White House has been withholding for five years more than 9,000 top-secret documents sought by the Senate Select Committee on Intelligence for its investigation into the now-defunct CIA detention and interrogation program, even though President Barack Obama hasn’t exercised a claim of executive privilege.

In contrast to public assertions that it supports the committee’s work, the White House has ignored or rejected offers in multiple meetings and in letters to find ways for the committee to review the records, a McClatchy investigation has found.

And Senator Mark Udall said that Obama knew about the CIA’s spying on Congress.

Not Just the CIA … And Not a New Problem

But it’s not just the CIA.   And there has been a constitutional crisis for a long time.

For example, the FBI collected files on everyone.  As the New York Times reports:

J. Edgar Hoover compiled secret dossiers on the sexual peccadillos and private misbehavior of those he labeled as enemies — really dangerous people like … President John F. Kennedy, for example.

The NSA has been spying on – and intimidating – its “overseers” in Washington.  Indeed, the NSA spied on anti-war Congress members in the 1970s … including the chair of the Congressional Committee investigating illegal NSA spying.

One of the NSA  whistleblower sources for the big 2005 New York Times exposé on illegal spying – Russel Tice – says that the NSA illegally spied on General Petraeus and other generals, Supreme Court Justice Alito and all of the other supreme court justices, the White House spokesman, and many other top officials.

The Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate intelligence committee was not cleared to hear such information:

Renee Seymour, director of NSA special access programs stated in a Jan. 9 letter to Russ Tice that he should not testify about secret electronic intelligence programs because members and staff of the House and Senate intelligence committees do not have the proper security clearances for the secret intelligence.

(And see this.)

Former high-level NSA executive Bill Binney points out how absurd that statement is:

Russ Tice … was prepared to testify to Congress to this, too, and so NSA sent him a letter saying, we agree that you have a right to go to Congress to testify, but we have to advise you that the intelligence committees that you want to testify to are not cleared for the programs you want to speak about. Now, that fundamentally is an open admission … by NSA that they are violating the intelligence acts of 1947 and 1978, which require NSA and all other intelligence agencies to notify Congress of all the programs that they’re running so they can have effective oversight, which they’ve never had anyway.

Binney confirmed to Washington’s Blog:

The violations of law and the constitution are being openly admitted by both Congress and the NSA.

The Other Story Getting Lost In the Shuffle

And there’s another story getting lost in the shuffle …

Sure, the top independent interrogation experts say that torture is ineffective … and actually harms national security. You’ve probably already heard arguments one way or the other on this issue, and likely have made up your mind about it.

But remember, the torture used by the U.S. on the Guantanamo suspects was of a “special” type.

Specifically, Senator Levin revealed that the the U.S. used Communist torture techniques specifically aimed at creating false confessions. And see these important reports from McClatchy, New York Times, CNN and Huffington Post.

In other words, were not just talking about torture.  We’re talking about deploying a special type of torture in order to get FALSE confessions.

In addition, the Atlantic notes:

America is likely to torture again, if we aren’t doing it already.

(And see this and this.)

A related part of this underreported part of the torture story is that the CIA’s torture program ended up deceiving the 9/11 Commission. Specifically, the 9/11 Commission Report was largely based on third-hand accounts of what tortured detainees said, with two of the three parties in the communication being government employees. The 9/11 Commissioners were not allowed to speak with the detainees, or even their interrogators. Instead, they got their information third-hand. The Commission itself didn’t really trust the interrogation testimony… yet published it as if it were Gospel.

New York Times investigative reporter Philip Shenon noted in a 2009 essay in Newsweek that the 9/11 Commission Report was unreliable because most of the information was based on the statements of tortured detainees.

NBC News reported:

  • Much of the 9/11 Commission Report was based upon the testimony of people who were tortured
  • At least four of the people whose interrogation figured in the 9/11 Commission Report have claimed that they told interrogators information as a way to stop being “tortured.”
  • One of the Commission’s main sources of information was tortured until he agreed to sign a confession that he was NOT EVEN ALLOWED TO READ
  • The 9/11 Commission itself doubted the accuracy of the torture confessions, and yet kept their doubts to themselves

And the CIA videotaped the interrogation of 9/11 suspects, but falsely told the 9/11 Commission that there were no videotapes or other records of the interrogations, and then illegally destroyed all of the tapes and transcripts of the interrogations. (As discussed above, the current head CIA lawyer helped to destroy the tapes.)

9/11 Commission co-chairs Thomas Keane and Lee Hamilton wrote:

Those who knew about those videotapes — and did not tell us about them — obstructed our investigation.

***

Government officials decided not to inform a lawfully constituted body, created by Congress and the president, to investigate one the greatest tragedies to confront this country. We call that obstruction.

In other words,  we’ve got a rogue governmentThat’s the big story behind the CIA-congressional battle.

original link

Read Full Post »


White House withholds thousands of documents from Senate CIA probe, despite vows of help

13 Mar 2014 The White House has been withholding for five years more than 9,000 top-secret documents sought by the Senate Select Committee on Intelligence for its investigation into the now-defunct CIA detention and interrogation program, even though President Barack Obama hasn’t exercised a claim of executive privilege. In contrast to public assertions that it supports the committee’s work, the White House has ignored or rejected offers in multiple meetings and in letters to find ways for the committee to review the records, a McClatchy investigation has found. The administration’s refusal to turn them over or to agree to any compromise raises questions about what they would reveal about the CIA’s use of waterboarding and other harsh interrogation techniques tortures on suspected terrorists in secret overseas prisons.

[Yeah, there’s no way on *God’s green earth* Barack Obama is going to turn on his former employer, the CIA. Notice that one of President Obama’s *first priorities* was to pardon the war criminals in the previous regime — an unelected junta installed by the Supreme Court?

Read Full Post »


NYT–The chairwoman of the Senate intelligence committee on Tuesday accused the Central Intelligence Agency of improperly removing documents from computers that committee staff members had been using to complete a report on the agency’s detention program, saying the move was part of an effort to intimidate the committee.

13089388194_c96e582926_b12478672155_e412cb1453_b

Feinstein is showing her stripes

She’s one of those tyranny types

With swastika crotch

Big Sis likes to watch

And ALL information she swipes

The Limerick King

Read Full Post »


feature image number one

A former CIA and civilian pilot has sworn an affidavit, stating that no planes flew into the Twin Towers as it would have been physically impossible.

John Lear, the son of Learjet inventor, Bill Lear, has given his expert evidence that it would have been physically impossible for Boeing 767s, like Flights AA11 and UA175 to have hit the Twin Towers on 9/11, particularly when flown by inexperienced pilots:

‘No Boeing 767 airliners hit the Twin Towers as fraudulently alleged by the government, media, NIST and its contractors’, he stated in the affidavit.

‘Such crashes did not occur because they are physically impossible as depicted, for the following reasons: in the case of UAL 175 going into the south tower, a real Boeing 767 would have begun ‘telescoping’ when the nose hit the 14 inch steel columns which are 39 inches on center.

‘The vertical and horizontal tail would have instantaneously separated from the aircraft, hit the steel box columns and fallen to the ground.

‘The engines when impacting the steel columns would havemaintained their general shape and either fallen to the ground or been recovered in the debris of the collapsed building.

‘No Boeing 767 could attain a speed of 540 mph at 1000 feet above sea level ‘parasite drag doubles with velocity’ and ‘parasite power’ cubes with velocity.

  • The fan portion of the engine is not designed to accept the volume of dense air at that altitude and speed.
  • The piece of alleged external fuselage containing 3 or 4 window cutouts is inconsistent with an airplane that hit 14 inch steel box columns, placed at over 500 mph.  It would have crumpled.
  • No significant part of the Boeing 767 or engine could have penetrated the 14 inch steel columns and 37 feet beyond the massive core of the tower without part of it falling to the ground.

‘The debris of the collapse should have contained massive sections of the Boeing 767, including 3 engine cores weighing approximately 9000 pounds apiece which could not have been hidden. Yet there is no evidence of any of these massive structural components from either 767 at the WTC. Such complete disappearance of 767s is impossible.

The affidavit, dated 28th January 2014 is part of a law suit being pursued by Morgan Reynolds in the United States District Court, Southern District, New York.

In March 2007, Reynolds, a former chief economist under the George W Bush administration filed a Request For Correction with the US National Institute of Science and Technology citing his belief that real commercial jets (Boeings) did not hit the WTC towers.

Although the 9/11 Truth movement initially rejected the ‘no-planes’ theory as too outlandish, after scientific and rational analysis, it has become a widely accepted explanation of the evidence collected.

feature image number two

Unlike any other form of statement, an affidavit becomes truth in law, if it is not rebutted.  It will now be up to critics of the theory to present their evidence and analysis to rebut the statement point by point.  If they do not – or cannot – then the US government will be obliged to admit that the account given by the 9/11 Commission is wrong.

The 65 year old retired airline captain and former CIA pilot – who has over 19,000 hours of flight time — also drew attention to the inexperience of the pilots who allegedly flew the planes:

‘The alleged ‘controlled’ descent into New York on a relatively straight course by a novice pilot in unlikely in the extreme because of the difficulty of controlling heading, descent rate and descent speed within the parameters of ‘controlled’ flight.

‘It takes a highly skilled pilot to interpret the “EFIS” (Electronic Flight Instrument Display) display, with which none of the hijacker pilots would have been familiar or received training on, and use his controls, including the ailerons, rudder, elevators, spoilers and throttles to effect, control and maintain a descent.

Lear has, according to his sworn statement, flown over 100 different types of planes during his 40 years of flying and holds more FAA airman certificates than any other FAA certificated airman. He flew secret missions for the CIA in Southeast Asia, Eastern Europe, the Middle East and Africa between 1967 and 1983 then spent 17 years working for several passenger and cargo airlines as Captain, Check Airman and Instructor.

He is a member of Pilotfor911truth.org, which has consistently shown that it was impossible for jet airliners to have hit the Twin Towers in the way the 9/11 Commission has suggested.

The Commission did not take evidence from experts or pilots when it conducted its enquiry into the attacks from 2002 to 2004.

 source link

Read Full Post »


500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent

No matter which government conducts mass surveillance, they also do it to crush dissent, and then give a false rationale for why they’re doing it.

For example, the U.S. Supreme Court noted in Stanford v. Texas (1965):

While the Fourth Amendment [of the U.S. Constitution] was most immediately the product of contemporary revulsion against a regime of writs of assistance, its roots go far deeper. Its adoption in the Constitution of this new Nation reflected the culmination in England a few years earlier of a struggle against oppression which had endured for centuries. The story of that struggle has been fully chronicled in the pages of this Court’s reports, and it would be a needless exercise in pedantry to review again the detailed history of the use of general warrants as instruments of oppression from the time of the Tudors, through the Star Chamber, the Long Parliament, the Restoration, and beyond.

 

What is significant to note is that this history is largely a history of conflict between the Crown and the press. It was in enforcing the laws licensing the publication of literature and, later, in prosecutions for seditious libel, that general warrants were systematically used in the sixteenth, seventeenth, and eighteenth centuries. In Tudor England, officers of the Crown were given roving commissions to search where they pleased in order to suppress and destroy the literature of dissent, both Catholic and Puritan. In later years, warrants were sometimes more specific in content, but they typically authorized of all persons connected of the premises of all persons connected with the publication of a particular libel, or the arrest and seizure of all the papers of a named person thought to be connected with a libel.

By “libel”, the court is referring to a critique of the British government  which the King or his ministers didn’t like … they would label such criticism “libel” and then seize all of the author’s papers.

The Supreme Court provided interesting historical details in the case of Marcus v. Search Warrant (1961):

The use by government of the power of search and seizure as an adjunct to a system for the suppression of objectionable publications … was a principal instrument for the enforcement of the Tudor licensing system. The Stationers’ Company was incorporated in 1557 to help implement that system, and was empowered

 

“to make search whenever it shall please them in any place, shop, house, chamber, or building or any printer, binder or bookseller whatever within our kingdom of England or the dominions of the same of or for any books or things printed, or to be printed, and to seize, take hold, burn, or turn to the proper use of the aforesaid community, all and several those books and things which are or shall be printed contrary to the form of any statute, act, or proclamation, made or to be made. . . .

 

An order of counsel confirmed and expanded the Company’s power in 1566,  and the Star Chamber reaffirmed it in 1586 by a decree

 

“That it shall be lawful for the wardens of the said Company for the time being or any two of the said Company thereto deputed by the said wardens, to make search in all workhouses, shops, warehouses of printers, booksellers, bookbinders, or where they shall have reasonable cause of suspicion, and all books [etc.] . . . contrary to . . . these present ordinances to stay and take to her Majesty’s use. . . . ”

 

Books thus seized were taken to Stationers’ Hall where they were inspected by ecclesiastical officers, who decided whether they should be burnt. These powers were exercised under the Tudor censorship to suppress both Catholic and Puritan dissenting literature.

 

Each succeeding regime during turbulent Seventeenth Century England used the search and seizure power to suppress publications. James I commissioned the ecclesiastical judges comprising the Court of High Commission

 

“to enquire and search for . . . all heretical, schismatical and seditious books, libels, and writings, and all other books, pamphlets and portraitures offensive to the state or set forth without sufficient and lawful authority in that behalf, . . . and the same books [etc.] and their printing presses themselves likewise to seize and so to order and dispose of them . . . as they may not after serve or be employed for any such unlawful use. . . .”

 

The Star Chamber decree of 1637, reenacting the requirement that all books be licensed, continued the broad powers of the Stationers’ Company to enforce the licensing laws.  During the political overturn of the 1640′s, Parliament on several occasions asserted the necessity of a broad search and seizure power to control printing. Thus, an order of 1648 gave power to the searchers

 

“to search in any house or place where there is just cause of suspicion that Presses are kept and employed in the printing of Scandalous and lying Pamphlets, . . . [and] to seize such scandalous and lying pamphlets as they find upon search. . . .”

 

The Restoration brought a new licensing act in 1662. Under its authority, “messengers of the press” operated under the secretaries of state, who issued executive warrants for the seizure of persons and papers. These warrants, while sometimes specific in content, often gave the most general discretionary authority. For example, a warrant to Roger L’Estrange, the Surveyor of the Press, empowered him to “seize all seditious books and libels and to apprehend the authors, contrivers, printers, publishers, and dispersers of them,” and to

 

search any house, shop, printing room, chamber, warehouse, etc. for seditious, scandalous or unlicensed pictures, books, or papers, to bring away or deface the same, and the letter press, taking away all the copies. . . .]”

 

***

 

Although increasingly attacked, the licensing system was continued in effect for a time even after the Revolution of 1688, and executive warrants continued to issue for the search for and seizure of offending books. The Stationers’ Company was also ordered

 

“to make often and diligent searches in all such places you or any of you shall know or have any probable reason to suspect, and to seize all unlicensed, scandalous books and pamphlets. . . .”

 

And even when the device of prosecution for seditious libel replaced licensing as the principal governmental control of the press,  it too was enforced with the aid of general warrants — authorizing either the arrest of all persons connected with the publication of a particular libel and the search of their premises or the seizure of all the papers of a named person alleged to be connected with the publication of a libel.

And see this.

General warrants were largely declared illegal in Britain in 1765.  But the British continued to use general warrants in the American colonies.  In fact, the Revolutionary War was largely launched to stop the use of general warrants in the colonies.  King George gave various excuses of why general warrants were needed for the public good, of course … but such excuses were all hollow.

The New York Review of Books notes that the American government did not start to conduct mass surveillance against the American people until long after the Revolutionary War ended … but once started, the purpose was to crush dissent:

In the United States, political spying by the federal government began in the early part of the twentieth century, with the creation of the Bureau of Investigation in the Department of Justice on July 1, 1908. In more than one sense, the new agency was a descendant of the surveillance practices developed in France a century earlier, since it was initiated by US Attorney General Charles Joseph Bonaparte, a great nephew of Napoleon Bonaparte, who created it during a Congressional recess. Its establishment was denounced by Congressman Walter Smith of Iowa, who argued that “No general system of spying upon and espionage of the people, such as has prevailed in Russia, in France under the Empire, and at one time in Ireland, should be allowed to grow up.”

 

Nonetheless, the new Bureau became deeply engaged in political surveillance during World War I when federal authorities sought to gather information on those opposing American entry into the war and those opposing the draft. As a result of this surveillance, many hundreds of people were prosecuted under the 1917 Espionage Act and the 1918 Sedition Act for the peaceful expression of opinion about the war and the draft.

 

But it was during the Vietnam War that political surveillance in the United States reached its peak. Under Presidents Lyndon Johnson and, to an even greater extent, Richard Nixon, there was a systematic effort by various agencies, including the United States Army, to gather information on those involved in anti-war protests. Millions of Americans took part in such protests and the federal government—as well as many state and local agencies—gathered enormous amounts of information on them. Here are just three of the numerous examples of political surveillance in that era:

  • In the 1960s in Rochester, New York, the local police department launched Operation SAFE (Scout Awareness for Emergency). It involved twenty thousand boy scouts living in the vicinity of Rochester. They got identification cards marked with their thumb prints. On the cards were the telephone numbers of the local police and the FBI. The scouts participating in the program were given a list of suspicious activities that they were to report.
  • In 1969, the FBI learned that one of the sponsors of an anti-war demonstration in Washington, DC, was a New York City-based organization, the Fifth Avenue Peace Parade Committee, that chartered buses to take protesters to the event. The FBI visited the bank where the organization maintained its account to get photocopies of the checks written to reserve places on the buses and, thereby, to identify participants in the demonstration. One of the other federal agencies given the information by the FBI was the Internal Revenue Service.

***

 

The National Security Agency was involved in the domestic political surveillance of that era as well. Decades before the Internet, under the direction of President Nixon, the NSA made arrangements with the major communications firms of the time such as RCA Global and Western Union to obtain copies of telegrams. When the matter came before the courts, the Nixon Administration argued that the president had inherent authority to protect the country against subversion. In a unanimous decision in 1972, however, the US Supreme Court rejected the claim that the president had the authority to disregard the requirement of the Fourth Amendment for a judicial warrant.

 

***

 

Much of the political surveillance of the 1960s and the 1970s and of the period going back to World War I consisted in efforts to identify organizations that were critical of government policies, or that were proponents of various causes the government didn’t like, and to gather information on their adherents. It was not always clear how this information was used. As best it is possible to establish, the main use was to block some of those who were identified with certain causes from obtaining public employment or some kinds of private employment. Those who were victimized in this way rarely discovered the reason they had been excluded.

 

Efforts to protect civil liberties during that era eventually led to the destruction of many of these records, sometimes after those whose activities were monitored were given an opportunity to examine them. In many cases, this prevented surveillance records from being used to harm those who were spied on. Yet great vigilance by organizations such as the ACLU and the Center for Constitutional Rights, which brought a large number of court cases challenging political surveillance, was required to safeguard rights. The collection of data concerning the activities of US citizens did not take place for benign purposes.

 

***

 

Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them. The first target was the Communist Party of the United States, but subsequent targets ranged from the Reverend Martin Luther King, Jr. and his Southern Christian Leadership Conference to organizations espousing women’s rights to right wing organizations such as the National States Rights Party.

 

A well-known example of COINTELPRO was the FBI’s planting in 1964 of false documents about William Albertson, a long-time Communist Party official, that persuaded the Communist Party that Albertson was an FBI informant. Amid major publicity, Albertson was expelled from the party, lost all his friends, and was fired from his job. Until his death in an automobile accident in 1972, he tried to prove that he was not a snitch, but the case was not resolved until 1989, when the FBI agreed to pay Albertson’s widow $170,000 to settle her lawsuit against the government.

 

COINTELPRO was eventually halted by J. Edgar Hoover after activists broke into a small FBI office in Media, Pennsylvania, in 1971, and released stolen documents about the program to the press. The lesson of COINTELPRO is that any government agency that is able to gather information through political surveillance will be tempted to use that information. After a time, the passive accumulation of data may seem insufficient and it may be used aggressively. This may take place long after the information is initially collected and may involve officials who had nothing to do with the original decision to engage in surveillance.

Indeed, during the Vietnam war, the NSA spied on Senator Frank Church because of his criticism of the Vietnam War. The NSA also spied on Senator Howard Baker.

Senator Church – the head of a congressional committee investigating Cointelpro – warned in 1975:

[NSA's] capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.  [If a dictator ever took over, the N.S.A.] could enable it to impose total tyranny, and there would be no way to fight back.

This is, in fact, what’s happened …

Initially, American constitutional law experts say that the NSA is doing exactly the same thing to the American people today which King George did to the Colonists … using “general warrant” type spying.

And it is clear that the government is using its massive spy programs in order to track those who question government policies. See this, this, this  and this.

Todd Gitlin – chair of the PhD program in communications at Columbia University, and a professor of journalism and sociology -  notes:

Under the Freedom of Information Act, the Partnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups — during the very time that they were missing actual warnings about actual terrorist actions.

 

From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI, and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places.  In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’”

 

Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center (BRIC), one of 77 coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily.  As the investigative journalist Michael Isikoff recently reported, they were not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’”

 

It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber.  That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either.  The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of…Code Pink and Veterans for Peace.

 

***

 

In Alaska, Alabama, Florida, Mississippi, Tennessee, and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations — and vice versa.

 

Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.”  Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.”  Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:

 

• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”

 

• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to… [22] campus police officials… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”

 

• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on Nov. 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services (NCIS) reported to DSAC on the relationship between OWS and organized labor.”

 

• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” ***

 

• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee, and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.

 

• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.”  Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’”

 

***

 

In 2010, the American Civil Liberties Union of Tennessee learned … that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents.  The letter encourages schools to be supportive of all religious beliefs during the holiday season.”

 

***

 

Consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’”

 

***

 

And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies.  According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’”  The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’

 

Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”

 

***

 

In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department Inspector General’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects.  The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.

 

“The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor.  He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.”

 

The sequel was not quite so droll.  The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.

 

Moreover, at least one fusion center has involved military intelligence in civilian law enforcement.  In 2009, a military operative from Fort Lewis, Washington, worked undercover collecting information on peace groups in the Northwest.  In fact, he helped run the Port Militarization Resistance group’s Listserv.  Once uncovered, he told activists there were others doing similar work in the Army.  How much the military spies on American citizens is unknown and, at the moment at least, unknowable.

 

Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos — I have some in my own heavily redacted files obtained through an FOIA request — were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case.  During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to Military Surveillance of Civilian Politics, 1967-70, an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews.  They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Yes, we hear echoes to the Cointelpro program of the 60s and 70s … as well as King George’s General Warrants to the Colonies … and the Star Chamber of 15th century England.

Because – whatever governments may say – mass surveillance is always used to crush dissent.

Read Full Post »


CIA BUSY IN RUSSIA? with videos here


The December 2013 bus bombing in Volgograd.

Arthur Atayev, of Russia’s Institute of Strategic Research says that the organisers of the attacks in VOLGOGRAD “are located outside Russia (presumably the CIA and its friends).

 

“And they have been launching destabilizing attacks in Russia for a long time in order to reduce its foreign policy influence…”

Peter Power, Managing Director of Crisis Management at Visor Consultants, says that the terrorists concentrate on obvious targets.

He says: “Volgograd is a transport hub for this part of Russia…


“So transport, communication, economy – all these issues are pretty obvious targets to hit and produce an immediate impact on the Russian public, and not only Russian but also for those who are travelling there next year.”
Cannabis Ad

Read Full Post »


The Official video for John Lennon ‘Merry Xmas (War Is Over)’

 

Read Full Post »


CIA probe into Bay of Pigs should be kept secret – Obama admin

14 Dec 2013 Over 50 years after the Bay of Pigs invasion went awry, the US federal government is still attempting to keep secrets about the failed overthrow of the Cuban government, with an Obama administration lawyer arguing this week to keep a document classified. The National Security Archive, a private research institution, has sought to force the government to hand over the fifth of a five-volume internal account of the Bay of Pigs. Penned by a CIA staff historian in the years between 1973 and 1984, the final document chronicles – and presumably critiques – the CIA’s own investigation of how the invasion went wrong.

Read Full Post »


EXCLUSIVE: CIA Psychologist’s Notes Reveal True Purpose Behind Bush’s Torture Program

7tp-033111-7_0.jpg

This diagram was included in a paper written by Dr. Bruce Jessen’s and shows his view of the conflicting psychological pressures bearing down on a prisoner who is held captive by an enemy. (Click here to view full image.)

December 7, 2013

Dr. Bruce Jessen’s handwritten notes describe some of the torture techniques that were used to “exploit” “war on terror” detainees in custody of the CIA and Department of Defense.

Bush administration officials have long asserted that the torture techniques used on “war on terror” detainees were utilized as a last resort in an effort to gain actionable intelligence to thwart pending terrorist attacks against the United States and its interests abroad.

But the handwritten notes obtained exclusively by Truthout drafted two decades ago by Dr. John Bruce Jessen, the psychologist who was under contract to the CIA and credited as being one of the architects of the government’s top-secret torture program, tell a dramatically different story about the reasons detainees were brutalized and it was not just about obtaining intelligence.

Jason Leopold interviews Jessen’s former SERE colleague, retired Air Force Capt. Michael Kearns.

Rather, as Jessen’s notes explain, torture was used to “exploit” detainees, that is, to break them down physically and mentally, in order to get them to “collaborate” with government authorities. Jessen’s notes emphasize how a “detainer” uses the stresses of detention to produce the appearance of compliance in a prisoner.

Click to view notes larger.

Click to view larger.

Indeed, a report released in 2009 by the Senate Armed Services Committee about the treatment of detainees in US custody said Jessen was the author of a “Draft Exploitation Plan” presented to the Pentagon in April 2002 that was implemetned  at Guantanamo and at prison facilities in Iraq and Afghanistan. But to what degree is unknown because the document remains classified. Jessen also co-authored a memo in February 2002 on “Prisoner Handling Recommendations” at Guantanamo, which is also classified.

Moreover, the Armed Services Committee’s report noted that torture techniques approved by the Bush administration were based on survival training exercises US military personnel were taught by individuals like Jessen if they were captured by an enemy regime and subjected to “illegal exploitation” in violation of the Geneva Conventions.

Jessen’s notes, prepared for an Air Force survival training course that he later “reverse engineered” when he helped design the Bush administration’s torture program, however, go into far greater detail than the Armed Services Committee’s report in explaining how prisoners would be broken down physically and psychologically by their captors. The notes say survival training students could “combat interrogation and torture” if they are captured by an enemy regime by undergoing intense training exercises, using “cognitive” and “exposure techniques” to develop “stress inoculation.” [Click here to download a PDF file of Jessen's handwritten notes. Click here to download a zip file of Jessen's notes in typewritten form.]

The documents stand as the first piece of hard evidence to surface in nine years that further explains the psychological aspects of the Bush administration’s torture program and the rationale for subjecting detainees to so-called “enhanced interrogation techniques.”

Jessen’s notes were provided to Truthout by retired Air Force Capt. Michael Kearns, a “master” SERE instructor and decorated veteran who has previously held high-ranking positions within the Air Force Headquarters Staff and Department of Defense (DoD).

Kearns and his boss, Roger Aldrich, the head of the Air Force Intelligence’s Special Survial Training Program (SSTP), based out of Fairchild Air Force Base in Spokane, Washington, hired Jessen in May 1989. Kearns, who was head of operations at SSTP and trained thousands of service members, said Jessen was brought into the program due to an increase in the number of new survival training courses being taught and “the fact that it required psychological expertise on hand in a full-time basis.”

“Special Mission Units”

Jessen, then the chief of Psychology Service at the US Air Force Survival School, immediately started to work directly with Kearns on “a new course for special mission units (SMUs), which had as its goal individual resistance to terrorist exploitation.”

The course, known as SV-91, was developed for the Survival Evasion Resistance Escape (SERE) branch of the US Air Force Intelligence Agency, which acted as the Executive Agent Action Office for the Joint Chiefs of Staff. Jessen’s notes formed the basis for one part of SV-91, “Psychological Aspects of Detention.”

Special mission units fall under the guise of the DoD’s clandestine Joint Special Operations Command (JSOC) and engage in a wide-range of highly classified counterterrorist and covert operations, or “special missions,” around the world, hundreds of who were personally trained by Kearns. The SV-91 course Jessen and Kearns were developing back in 1989 would later become known as “Special Survival for Special Mission Units.”

Before the inception of SV-91, the primary SERE course was SV-80, or Basic Combat Survival School for Resistance to Interrogation, which is where Jessen formerly worked. When Jessen was hired to work on SV-91, the vacancy at SV-80 was filled by psychologist Dr. James Mitchell, who was also contracted by the CIA to work at the agency’s top-secret black site prisons in Europe employing SERE torture techniques, such as the controlled drowning technique know as waterboarding, against detainees.

While they were still under contract to the CIA, the two men formed the “consulting” firm Mitchell, Jessen & Associates in March 2005. The “governing persons” of the company included Kearns’ former boss, Aldrich, SERE contractor David Tate, Joseph Matarazzo, a former president of the American Psychological Association and Randall Spivey, the ex-chief of Operations, Policy and Oversight Division of JPRA.

Mitchell, Jessen & Associates’ articles of incorporation have been “inactive” since October 22, 2009 and the business is now listed as “dissolved,” according to Washington state’s Secretary of State website.

Capt. Michael Kearns (left) and Dr. Bruce Jessen at Fort Bragg’s Nick Rowe SERE Training Center, 1989. Photo courtesy of retired Air Force Capt. Michael Kearns.

Lifting the “Veil of Secrecy”

Kearns was one of only two officers within DoD qualified to teach all three SERE-related courses within SSTP on a worldwide basis, according to a copy of a 1989 letter written by Aldrich, who nominated Kearns officer of the year.

He said he decided to come forward because he is outraged that Jessen used their work to help design the Bush administration’s torture program.

“I think it’s about time for SERE to come out from behind the veil of secrecy if we are to progress as a moral nation of laws,” Kearns said during a wide-ranging interview with Truthout. “To take this survival training program and turn it into some form of nationally sanctioned, purposeful program for the extraction of information, or to apply exploitation, is in total contradiction to human morality, and defies basic logic. When I first learned about interrogation, at basic intelligence training school, I read about Hans Scharff, a Nazi interrogator who later wrote an article for Argosy Magazine titled ‘Without Torture.’ That’s what I was taught – torture doesn’t work.”

What stands out in Jessen’s notes is that he believed torture was often used to produce false confessions. That was the end result after one high-value detainee who was tortured in early 2002 confessed to having information proving a link between the late Iraqi dictator Saddam Hussein and al-Qaeda, according to one former Bush administration official.

It was later revealed, however, that the prisoner, Ibn al-Shaykh al-Libi, had simply provided his captors a false confession so they would stop torturing him. Jessen appeared to be concerned with protecting the US military against falling victim to this exact kind of physical and psychological pressure in a hostile detention environment, recognizing that it would lead to, among other things, false confessions.

In a paper Jessen wrote accompanying his notes, “Psychological Advances in Training to Survive Captivity, Interrogation and Torture,” which was prepared for the symposium: “Advances in Clinical Psychological Support of National Security Affairs, Operational Problems in the Behavioral Sciences Course,” he suggested that additional “research” should be undertaken to determine “the measurability of optimum stress levels in training students to resist captivity.”

“The avenues appear inexhaustible” for further research in human exploitation, Jessen wrote.

Such “research” appears to have been the main underpinning of the Bush administration’s torture program. The experimental nature of these interrogation methods used on detainees held at Guantanamo and at CIA black site prisons have been noted by military and intelligence officials. The Armed Services Committee report cited a statement from Col. Britt Mallow, the commander of the Criminal Investigative Task Force (CITF), who noted that Guantanamo officials Maj. Gen. Mike Dunleavy and Maj. Gen. Geoffrey Miller used the term “battle lab” to describe the facility, meaning “that interrogations and other procedures there were to some degree experimental, and their lessons would benefit [the Department of Defense] in other places.”

What remains a mystery is why Jessen took a defensive survival training course and assisted in turning it into an offensive torture program.

Truthout attempted to reach Jessen over the past two months for comment, but we were unable to track him down. Messages left for him at a security firm in Alexandria, Virginia he has been affiliated with were not returned and phone numbers listed for him in Spokane were disconnected.

A New Emphasis on Terrorism

SV-91 was developed to place a new emphasis on terrorism as SERE-related courses pertaining to the cold war, such as SV-83, Special Survival for Sensitive Reconnaissance Operations (SRO), whose students flew secret missions over the Soviet Union, Eastern Bloc, and other communist countries, were being scaled back.

The official patch of the Special Survival Training ProgramThe official coin of the Special Survival Training Program

The official patch and coin of the Special Survival Training Program. (Photo courtesy of retired Air Force Capt. Michael Kearns)

SSTP evolved into the Joint Personnel Recovery Agency (JPRA), the DoD’s executive agency for SERE training, and was tapped by DoD General Counsel William “Jim” Haynes in 2002 to provide the agency with a list of interrogation techniques and the psychological impact those methods had on SERE trainees, with the aim of utilizing the same methods for use on detainees. Aldrich was working in a senior capacity at JPRA when Haynes contacted the agency to inquire about SERE.

The Army also runs a SERE school as does the Navy, which had utilized waterboarding as a training exercise on Navy SERE students that JPRA recommended to DoD as one of the torture techniques to use on high-value detainees.

Kearns said the value of Jessen’s notes, particularly as they relate to the psychological aspects of the Bush administration’s torture program, cannot be overstated.

“The Jessen notes clearly state the totality of what was being reverse-engineered – not just ‘enhanced interrogation techniques,’ but an entire program of exploitation of prisoners using torture as a central pillar,” he said. “What I think is important to note, as an ex-SERE Resistance to Interrogation instructor, is the focus of Jessen’s instruction. It is exploitation, not specifically interrogation. And this is not a picayune issue, because if one were to ‘reverse-engineer’ a course on resistance to exploitation then what one would get is a plan to exploit prisoners, not interrogate them. The CIA/DoD torture program appears to have the same goals as the terrorist organizations or enemy governments for which SV-91 and other SERE courses were created to defend against: the full exploitation of the prisoner in his intelligence, propaganda, or other needs held by the detaining power, such as the recruitment of informers and double agents. Those aspects of the US detainee program have not generally been discussed as part of the torture story in the American press.”

Ironically, in late 2001, while the DoD started to make inquiries about adapting SERE methods for the government’s interrogation program, Kearns received special permission from the US government to work as an intelligence officer for the Australian Department of Defence to teach the Australian Special Air Service (SAS) how to use SERE techniques to resist interrogation and torture if they were captured by terrorists. Australia had been a staunch supporter of the invasion of Afghanistan and sent troops there in late 2001.

Kearns, who recently waged an unsuccessful Congressional campaign in Colorado, was working on a spy novel two years ago and dug through boxes of “unclassified historical materials on intelligence” as part of his research when he happened to stumble upon Jessen’s notes for SV-91. He said he was “deeply shocked and surprised to see I’d kept a copy of these handwritten notes as certainly the originals would have been destroyed (shredded)” once they were typed up and made into proper course materials.

“I hadn’t seen these notes for over twenty years,” he said. “However, I’ll never forget that day in September 2009 when I discovered them. I instantly felt sick, and eventually vomited because I felt so badly physically and emotionally that day knowing that I worked with this person and this was the material that I believe was ‘reverse-engineered’ and used in part to design the torture program. When I found the Jessen papers, I made several copies and sent them to my friends as I thought this could be the smoking gun, which proves who knew what and when and possibly who sold a bag of rotten apples to the Bush administration.”

Kearns was, however, aware of the role SERE played in the torture program before he found Jessen’s notes, and in July 2008, he sent an email to the chairman of the Armed Services Committee, Sen. Carl Levin, who was investigating the issue and offered to share information with Levin about Jessen and the SERE program in general. The Michigan Democrat responded to Kearns saying he was “concerned about this issue” and that he “needed more information on the subject,” but Levin never followed up when Kearns offered to help.

“I don’t know how it went off the tracks, but the names of the people who testified at the Senate Armed Services, Senate Judiciary, and Select Intelligence committees were people I worked with, and several I supervised,” Kearns said. “It makes me sick to know people who knew better allowed this to happen.”

Levin’s office did not return phone calls or emails for comment. However, the report he released in April 2009, “Inquiry Into the Treatment of Detainees in US Custody,” refers to SV-91. The report includes a list of acronyms used throughout the report, one of which is “S-V91,” identified as “the Department of Defense High Risk Survival Training” course. But there is no other mention throughout the report of SV-91 or the term “High Risk Survival Training,” possibly due to the fact that sections of the report where it is discussed remain classified. Still, the failure by Levin and his staff to follow up with Kearns–the key military official who had retained Jessen’s notes and helped develop the very course those notes were based upon that was cited in the report–suggests Levin’s investigation is somewhat incomplete.

Control and Dependence

A copy of the syllabus for SV-91, obtained by Truthout from another source who requested anonymity, states that the class was created “to provide special training for selected individuals that will enable them to withstand exploitation methods in the event of capture during peacetime operations…. to cope with such exploitation and deny their detainers useable information or propaganda.”

Although the syllabus focuses on propaganda and interrogation for information as the primary means of exploiting prisoners, Jessen’s notes amplify what was taught to SERE students and later used against detainees captured after 9/11 . He wrote that a prisoner’s captors seek to “exploit” the prisoner through control and dependence.

“From the moment you are detained (if some kind of exploitation is your Detainer’s goal) everything your Detainer does will be contrived to bring about these factors: CONTROL, DEPENDENCY, COMPLIANCE AND COOPERATION,” Jessen wrote. “Your detainer will work to take away your sense of control. This will be done mostly by removing external control (i.e., sleep, food, communication, personal routines etc. )…Your detainer wants you to feel ‘EVERYTHING’ is dependent on him, from the smallest detail, (food, sleep, human interaction), to your release or your very life … Your detainer wants you to comply with everything he wishes. He will attempt to make everything from personal comfort to your release unavoidably connected to compliance in your mind.”

Jessen wrote that cooperation is the “end goal” of the detainer, who wants the detainee “to see that [the detainer] has ‘total’ control of you because you are completely dependent on him, and thus you must comply with his wishes. Therefore, it is absolutely inevitable that you must cooperate with him in some way (propaganda, special favors, confession, etc.).”

Jessen described the kinds of pressures that would be exerted on the prisoner to achieve this goal, including “fear of the unknown, loss of control, dehumanization, isolation,” and use of sensory deprivation and sensory “flooding.” He also included “physical” deprivations in his list of detainer “pressures.”

“Unlike everyday experiences, however, as a detainee we could be subjected to stressors/coercive pressures which we cannot completely control,” he wrote. “If these stressors are manipulated and increased against us, the cumulative effect can push us out of the optimum range of functioning. This is what the detainer wants, to get us ‘off balance.’”

“The Detainer wants us to experience a loss of composure in hopes we can be manipulated into some kind of collaboration…” Jessen wrote. “This is where you are most vulnerable to exploitation. This is where you are most likely to make mistakes, show emotions, act impulsively, become discouraged, etc. You are still close enough to being intact that you would appear convincing and your behavior would appear ‘uncoerced.’”

Kearns said, based on what he has read in declassified government documents and news reports about the role SERE played in the  Bush administration’s torture program, Jessen clearly “reverse-engieered” his lesson plan and used resistance methods to abuse “war on terror” detainees.

The SSTP course was “specifically and intentionally designed to assist American personnel held in hostile detention,” Kearns said. It was “not designed for interrogation, and certainly not torture. We were not interrogators we were ‘role-players’ who introduced enemy exploitation techniques into survival scenarios as student learning objectives in what could be called Socratic-style dilemma settings. More specifically, resistance techniques were learned via significant emotional experiences, which were intended to inculcate long-term valid and reliable survival routines in the student’s memory. The one rule we had was ‘hands off.’ No (human intelligence) operator could lay hands on a student in a ‘role play scenario’ because we knew they could never ‘go there’ in the real world.”

But after Jessen was hired, Kearns contends, Aldrich immediately trained him to become a mock interrogator using “SERE harsh resistance to interrogation methods even though medical services officers were explicitly excluded from the ‘laying on’ of hands in [resistance] ‘role-play’ scenarios.”

Aldrich, who now works with the Center for Personal Protection & Safety in Spokane, did not return calls for comment.

“Torture Paper”

The companion paper Jessen wrote included with his notes, which was also provided to Truthout by Kearns, eerily describes the same torturous interrogation methods US military personnel would face during detention that Jessen and Mitchell “reverse engineered” a little more than a decade later and that the CIA and DoD used against detainees.

Indeed, in a subsection of the paper, “Understanding the Prisoner of War Environment,” Jessen notes how a prisoner will be broken down in an attempt to get him to “collaborate” with his “detainer.”

“This issue of collaboration is ‘the most prominent deliberately controlled force against the (prisoner of war),” Jessen wrote. “The ability of the (prisoner of war) to successfully resist collaboration and cope with the obviously severe approach-avoidance conflict is complicated in a systematic and calculated way by his captors.

“These complications include: Threats of death, physical pressures including torture which result in psychological disturbances or deterioration, inadequate diet and sanitary facilities with constant debilitation and illness, attacks on the mental health via isolation, reinforcement of anxieties, sleeplessness, stimulus deprivation or flooding, disorientation, loss of control both internal and external locus, direct and indirect attack on the (prisoner of war’s) standards of honor, faith in himself, his organization, family, country, religion, or political beliefs … Few seem to be able to hold themselves completely immune to such rigorous behavior throughout all the vicissitudes of long captivity. Confronted with these conditions, the unprepared prisoner of war experiences unmanageable levels of fear and despair.”

“Specific (torture resistance) techniques,” Jessen wrote, “taught to and implemented by the military member in the prisoner of war setting are classified” and were not discussed in the paper he wrote. He added, “Resistance Training students must leave training with useful resistance skills and a clear understanding that they can successfully resist captivity, interrogation or torture.”

Kearns also declined to cite the specific interrogation techniques used during SERE training exercises because that information is still classified. Nor would he comment as to whether the interrogations used methods that matched or were similar to those identified in the August 2002 torture memo prepared by former Justice Department attorneys John Yoo and Jay Bybee.

However, according to the Senate Armed Services Committee report “SERE resistance training … was used to inform” Yoo and Bybee’s torture memo, specifically, nearly a dozen of the brutal techniques detainees were subjected to, which included waterboarding, sleep deprivation, painful stress positions, wall slamming and placing detainees in a confined space, such as a container, where his movement is restricted. The CIA’s Office of Technical Services told Yoo and Bybee the SERE techniques used to inform the torture memo were not harmful, according to declassified government documents.

Many of the “complications,” or torture techniques, Jessen wrote about, declassified government documents show, became a standard method of interrogation and torture used against all of the high-value detainees in custody of the CIA in early 2002, including Abu Zubaydah and self-professed 9/11 mastermind Khalid Sheikh Mohammed, as well as detainees held at Guantanamo and prison facilities in Iraq and Afghanistan.

The issue of “collaborating” with one’s detainer, which Jessen noted was the most important in terms of controlling a prisoner, is a common theme among the stories of detainees who were tortured and later released from Guantanamo.

For example, Mamdouh Habib, an Australian citizen who was rendered to Egypt and other countries where he was tortured before being sent to Guantanamo, wrote in his memoir, “My Story: the Tale of a Terrorist Who Wasn’t,” after he was released without charge, that interrogators at Guantanamo “tried to make detainees mistrust one another so that they would inform on each other during interrogation.”

Binyam Mohamed, am Ethiopian-born British citizen, who the US rendered to a black site prison in Morocco, said that a British intelligence informant, a person he knew and who was recurited, came to him in his Moroccan cell and told him that if he became an intelligence asset for the British, his torture, which included scalpel cuts to his penis, would end. In December 2009, British government officials released documents that show Mohamed was subjected to SERE torture techniques during his captivity in the spring of 2002.

Abdul Aziz Naji, an Algerian prisoner at Guantanamo until he was forcibly repatriated against his wishes to Algeria in July 2010, told an Algerian newspaper that “some detainees had been promised to be granted political asylum opportunity in exchange of [sic] a spying role within the detention camp.”

Mohamedou Ould Salahi, whose surname is sometimes spelled “Slahi,” is a Mauritanian who was tortured in Jordan and Guantanamo. Investigative journalist Andy Worthington reported that Salahi was subjected to “prolonged isolation, prolonged sleep deprivation, beatings, death threats, and threats that his mother would be brought to Guantanamo and gang-raped” unless he collaborated with his interrogators. Salahi finally decided to become an informant for the US in 2003. As a result, Salahi was allowed to live in a special fenced-in compound, with television and refrigerator, allowed to garden, write and paint, “separated from other detainees in a cocoon designed to reward and protect.”

Still, despite collaborating with his detainers, the US government mounted a vigorous defense against Salahi’s petition for habeas corpus. His case continues to hang in legal limbo. Salahi’s fate speaks to the lesson Habib said he learned at Guantanamo: “you could never satisfy your interrogator.” Habib felt informants were never released “because the Americans used them against the other detainees.”

Jessen’s and Mitchell’s mutimillion dollar government contract was terminated by CIA Director Leon Panetta in 2009. According to an Associated Press report, the CIA agreed to pay – to the tune of $5 million – the legal bills incurred by their consulting firm.

Recently a complaint filed against Mitchell with the Texas State Board of Examiners of Psychologists by a San Antonio-based psychologist, an attorney who defended three suspected terrorists imprisoned at Guantanamo and by Zubaydah’s attorney Joseph Margulies. Their complaint sought to strip Mitchell of his license to practice psychology for violating the board’s rules as a result of the hands-on role he played in torturing detainees, was dismissed due to what the board said was a lack of evidence. Mitchell, who lives in Florida, is licensed in Texas. A similar complaint against Jessen may soon be filed in Idaho, where he is licensed to practice psychology.

Kearns, who took a graduate course in cognitive psychotherapy in 1988 taught by Jessen, still can’t comprehend what motivated his former colleague to turn to the “dark side.”

“Bruce Jessen knew better,” Kearns said, who retired in 1991 and is now working on his Ph.D in educational psychology. “His duplicitous act is appalling to me and shall haunt me for the rest of my life.

Read Full Post »


Read Full Post »


Narcotics: Business of Western wars

Container trucks carrying NATO supplies are seen parked at the Pakistani town of Chaman, before being moved to Afghanistan, July 27, 2012.

Container trucks carrying NATO supplies are seen parked at the Pakistani town of Chaman, before being moved to Afghanistan, July 27, 2012.
Sun Sep 29, 2013 8:31AM
By Gordon Duff

Heroin trafficking is the lubrication that keeps the wheels of Western politics moving as intended.”

Related Interviews:
It was only a week ago that the US government released Eric Harroun, a former soldier who had been fighting with foreign backed al-Qaeda terrorists and the CIA against the Assad government in Syria.

This week, former Army sergeant Joseph Hunter and a group of other veterans, one from Germany’s armed forces, were arrested for much the same thing, offering “security services” for Colombian drug cartels.

Were worldwide press censorship to ease, the public would learn that America’s drone program is used more for maintaining control of drug production and distribution than terrorism. In fact, according to Russian officials, heroin from Afghanistan, all produced and exported under unspoken but very public approval of US officials, killed over one million people last year.

Drug production, when examined using economic modeling, makes oil racketeering and arms trafficking seem primitive in comparison. No technology is used, fertilizer financed through IMF programs, poppy fields irrigated through USAID programs, heroin processed in German-built labs, shipped on American truck convoys or CIA-leased aircraft, distributed around the world at 10,000% profit.

The CIA has been doing this since the early 1980s and, as every sane person in the world knows, built the drug empire in Afghanistan, the largest in the world.

By “security,” we mean killings, in this case, the group had actually been hired by Americans posing as Colombian drug dealer.

Their job was to murder anyone, including drug enforcement officers, public officials and their family members, even the president of the United States, if asked.

There is a problem with all of this, perhaps more than one problem.

Isn’t this exactly what thousands of Americans, members of the military, the intelligence services, thugs working for USAID and NGOs, have been doing all along.

Political power of the drug

America’s government faces a shutdown, this time because powerful banks and insurance companies feel their profits and political power threatened by health care laws that regulate their long despicable practices.

The members of congress paid by the insurance and health care racketeers were, in dozens of cases, put into office by drug money laundered through offshore accounts controlled by former presidential candidate Mitt Romney.

This marriage of power, the narcotics lobby, the pro-war lobby, particularly McCain, Graham and Lieberman, is also the heart of the Israel lobby.

Before the last election, in meetings with the former head of the FBI’s drug task force, I was given documents outlining ties between top Republican Party officials and the Mexican drug cartels, which are currently terrorizing over a dozen American states.

Gangs of killers employed by these cartels, fully supported by the Republican Party, control most of America’s southwest region and are closely partnered with the LDS (Latter Day Saints) religious sect.

They have set up their own “kingdom,” called “Deseret” inside the United States where they have married religious rule with organized crime.

The Kingdom of Deseret still exists, a region covering nearly 18% of the United States, extending from the Mexican border to the snowy peaks of Idaho.

Citizens of Deseret control much of the FBI and CIA, gambling operations in Las Vegas and have enjoyed over a century of partnership with lawless elements in Mexico.

Extremists among the Deseret hierarchy boast of controlling America’s naval vessels operating in the Mediterranean and Persian Gulf and of their ability to access nuclear weapons.

This is the group that controls the NSA. The NSA’s $4 billion “fusion center” is being constructed in Utah, an LDS-controlled region, “ground zero” for the Kingdom of Deseret.

Background

As early as the 1840s, the LDS terrorized wagon trains heading across the west, kidnapping women, murdering all others.

Within their own community, they maintained control through “Avenging Angels,” assassins that enforced religious doctrine and hierarchical control, though murder. This system still exists.
It was the model for America’s current privatization model, with mercenary groups answerable to extremist organizations and racketeers, all paid for by American taxpayers, running drugs, delivering poison gas to al-Qaeda and orchestrating terror attacks.

In the late 1800s, the LDS or “Mormons” as they are called, fled to Mexico after an unsuccessful war against the United States. There, they formed alliances with bandits and revolutionaries along the border, groups that have now “morphed” into the drug cartels of today.

Those relationships are alive and well today and extend through the heart of America’s financial centers and controlling America’s lower legislative body, the House of Representatives.

Key members of that organization enjoy huge financial benefits from offshore accounts that were made public during the last election, made public and then forgotten.

This power is used in combination with the Israeli AIPAC lobby to support NSA spying and widespread manipulation of financial markets, particularly using the mass of proprietary data gleaned through spying and given to Israel through the recently publicized Memorandum of Understanding.

Call this a “front row ticket” to controlling all financial transactions, technology and intellectual property of the United States, controlling and peddling around the world through open and legalized “piracy.”

Afghanistan

The war in Afghanistan has made the power of the narcotics lobby over America’s military, intelligence and governmental organizations more than obvious.

The narcotics cartels obviously control America’s media.

During the 12 years of American rule, Afghanistan has gone from a nearly drug free nation under the Taliban to a country of addicts and the producer of over 95% of the world’s refined heroin.

Even the United Nations has been warned off, no longer even reporting heroin production in Afghanistan. America talks about its anti-drug efforts though former US envoy, Richard Hollbrooke, openly admitted that narcotics production was key to America’s policy in Afghanistan.

No one has spoken of it since.

Invisible drug empire

Two weeks ago, the US government sentenced an African American soldier, a West Point graduate, to prison for involvement in the heroin trade in Afghanistan. From Navy Times:
“A West Point graduate and former Army captain busted for trafficking heroin from Afghanistan to the U.S. was sentenced Sept. 4 to 10 years in a federal prison.
Saleem Akbar Sharif, 36, of Johns Island, S.C., also agreed to surrender $100,000 in drug profits. He pleaded guilty last year to conspiracy and possession with intent to distribute heroin.”

There is a problem here.

The US government has never admitted that heroin is produced in Afghanistan. They claim only opium paste is produced.

For a West Point graduate to be arrested for making only $100,000 selling narcotics, the crime should have been laziness and inefficiency.

No document has ever admitted any heroin production in Afghanistan, there are no records, and, in particular, not one photograph of any heroin production facility.

The US has never found one, in its “war on drugs.” Similarly, the US never found WMD’s in Iraq or the dozen or more massive underground bunker complexes Secretary of Defense Donald Rumsfeld cited when advocating an American invasion of Afghanistan. In a televised interview with Tim Russert, Rumsfeld spoke of facilities that housed thousands, underground monorails, storage of armored vehicles, entire cities underground. He supplied a graphic, not entirely unlike the cartoon Netanyahu held in his hands while humiliating himself before the UN general assembly in his diatribe about Iran’s nuclear energy program.

But heroin production does exist.

Yet, chemicals used to produce heroin are shipped into Afghanistan at US government expense labeled “dry cleaning supplies.”

The same containers leave through the Pakistani port of Karachi, laden with processed heroin, or so top security officials in Pakistan have told me.

These containers, unnumbered and unregistered, move under the full authority of the United States government.

If you check the Internet, looking for news of anti-drug operations or photographs posted on social network sites, you will never see opium transported, never see heroin processing facilities, never see a container loaded or a plane packed with heroin flown out to NATO headquarters in Brussels to be unloaded.

In a dozen years, there has been no evidence published, none sought and much suppressed.

This is the power of the private and not so private armies that protect and defend the world’s narcotics traffickers, a group which includes political leaders, the US, Canada, Britain, France, Israel, Switzerland, Turkey, certainly Afghanistan but more, so many more.

Heroin trafficking is the lubrication that keeps the wheels of Western politics moving as intended.

Read Full Post »

Older Posts »

Follow

Get every new post delivered to your Inbox.

Join 1,000 other followers

%d bloggers like this: