Posts Tagged ‘Central Intelligence Agency’


Read Full Post »

‘Since the end of World War Two the Central Intelligence Agency has been a major force in US and foreign news media, exerting considerable influence over what the public sees, hears and reads on a regular basis. CIA publicists and journalists alike will assert they have few, if any, relationships, yet the seldom acknowledged history of their intimate collaboration indicates a far different story–indeed, one that media historians are reluctant to examine.’

Read more: The CIA and the Media: 50 Facts the World Needs to Know
Visit TigerDirect.com for Offers and Deals on a Wide Category of Products!

Read Full Post »

Three major thesis are in competition concerning the culprit of the 9/11 attacks:


1. Islam Job: the official conclusion of the 9/11 Commission, blaming Muslim terrorists in general, and Osama bin Laden in particular;
2. Inside Job: the dominant thesis within the so-called 9/11 Truth movement, which accuses the American government, or a faction within the American Deep State;
3. Mossad Job: the rising alternative thesis within the community of truth seekers, which claim that the masterminds were a Zionist network close to the Israeli Likud.

There are variations on each thesis and middle grounds between them, but three camps can clearly be distinguished: the first ridicule the second as “conspiracy theorists”, while the second loath the third as anti-Semites. Each thus justifies its refusal to weigh the evidence produced by the other. Acknowledging this reality, by renouncing the bipolar vision of an information warfare between official liars and 9/11 truthers, and paying attention to the debate (or absence of the debate) between Inside-jobbers and Mossad-jobbers, is the first step toward a paradigm shift in “9/11ology”.

JFK 911This article takes the view of the third thesis. The author belongs to those who, after thousands of hours of research, came to the conclusion that the 9/11 false flag operation was planned by a Zionist network, with the aim of dragging the United States into a “war on terror” of their invention, of which the only ultimate beneficiary will be Israel, as Netanyahu well understood from the very day: “It’s very good […], it will generate immediate sympathy […], strengthen the bond between our two peoples.”[1]

I have already listed the evidence against Israel in a previous article and in my book JFK-9/11 (Progressive Press, 2014). The subject of this article is not the truth on 9/11—who did what and how—, but the media war on 9/11: who says what and why. Nevertheless, such an approach requires that we are able to weigh the credibility of each claim, and we will do that on a few key points.

We can notice from the outset that theses 1 and 3 each accuse a foreign power, unlike thesis 2. Before even looking at the evidence, it is obvious that an Outside Job thesis is more credible than the Inside Job thesis. There is something monstrous in the idea that a government can deceive and terrorize its own citizens by killing thousands of them, just for starting a series of wars which are not even in the nation’s interest. By comparison, a foreign power attacking the US under the false flag of a third power almost seems like fair play. This is an important remark, because it makes us wonder how and why the 9/11 Truth movement has been led to endorse massively the outrageous thesis 2 without even considering the more likely thesis 3. This is one of the questions I will tackle here.

The thesis that the masterminds of 9/11 worked for Israel does not mean that the Bush administration is innocent. Thesis 3 admits that thesis 2, unlike thesis 1, is not completely false and rests on hard evidence pointing to US complicity. But it claims that thesis 2 overrates that evidence while ignoring the evidence pointing to Israel. The question is to what extent it does so intentionally, that is, to what extent thesis 2 is a “controlled opposition” intended to cover up the truth of thesis 3.

Asking this type of question does not mean suspecting anyone who defends an erroneous or incomplete theory of being a hypocrite. Most people defending one theory or the other do so sincerely, based on the information they have access to. I have myself been a believer in thesis 1 for 7 years, and in thesis 2 for 2 years, before progressively moving on to thesis 3 from 2010. On the other hand, we can assume that those who lead masses into error on a long term, are not just mistaken but lying —they may also be lying to themselves, i.e., engaged in self-deception. In any case, it is legitimate to investigate the background and the means of opinion makers, and when they are caught lying or distorting the truth, we can ponder about their motivation.

This is what we will do in the first part, so as to demonstrate that liers are not confined to the official storytellers’ camp. It is not enough that someone challenges the official Big Lie for us to believe him blindly; his arguments and allegations should be judged by the same standard. The purpose of the two following examples is, firstly, to show the need for a critical mind when listening to dissenting theses, and, secondly, to show the need for a new paradigm taking into account the several layers of lies stacked on top of the truth. We will outline this new paradigm in a second part, in the form of a working hypothesis. Then, in a third part, we will see if this new paradigm is consistent with certain technical issues currently dividing 9/11 truthers.

more @ http://www.veteransnewsnow.com/2014/08/31/the-911-triple-cross/

Read Full Post »

It has been over two months since Malaysian flight MH-370 disappeared and still not a single credible trace of its final resting place has been found.

In the ongoing din over the confusion surrounding the recovery effort which has led nowhere, even the current Malaysian Prime Minister Najib Razak recently described the current rescue effort driven by satellite data of the suggested “location” of purported MH370 debris in the Indian Ocean as ‘bizarre’ and ‘hard to believe’. Further, he told CNN when discussing the satellite data which is the basis for the current search in the Indian Ocean that ‘To be honest, I found it hard to believe…. It’s a bizarre scenario which none of us could have contemplated so that’s why when I met the team…of foremost experts in aviation industry I asked them again and again “are you sure?”

In short: “nobody knows.” Or so the conventional wisdom goes.

One person, however, who thinks someone may know more than they are letting on is none other than the man who was the Prime Minister of Malaysia from 1981 to 2003, Mahathir Mohamad, and who in a blog post earlier today has some rather provocative questions and thoughts.

In his article, titled appropriately “What goes up must come down”, the former PM argues that flight did not crash and its current whereabouts may be know to the Central Intelligence Agency and the Boeing aircraft company: “It is a waste of time and money to look for debris or oil slick or to listen for “pings” from the black box. This is most likely not an ordinary crash after fuel was exhausted. The plane is somewhere, maybe without MAS markings.

But far more provocatively, and daring to utter a three letter acronym few others do, Mahathir said the plane could have been switched onto autopilot remotely by the CIA if it had been hijacked, citing a reference which claims that “The ‘uninterruptible’ autopilot would be activated – either by pilot, by on board sensors, or even remotely by radio or satellite links by government agencies like the Central Intelligence Agency, if terrorists attempt to gain control of the flight deck.”

Mahatir goes back to day one, when the first disclosure surrounding the fateful flight were made, and when it was clear that the pilot, for whatever reason, purposefully shut down the communication system. “The system must have been disabled or else the ground station could have called the plane.”

So putting two and two together, the former PM, who believes that “it is not fair that MAS and Malaysia should take the blame” concludes that “someone is hiding something.”

more@ http://www.zerohedge.com/news/2014-05-19/former-prime-minister-malaysia-accuses-cia-covering-mh-370-disappearance

Read Full Post »

Hillary “What Difference Does It Make?” Clinton is a war criminal of the likes of Madeleine “The Price is Worth It” Albright. Qaddafi was about to introduce the gold-backed African currency and all African oil would be exchanged for gold; Hugo Chavez was working on the Sucre–an alternative currency for all of South America. Both Qaddafi and Chavez were working on continental armies to thwart NATO and had oil to back up their ideas. View this video.

Read Full Post »

NYT–The chairwoman of the Senate intelligence committee on Tuesday accused the Central Intelligence Agency of improperly removing documents from computers that committee staff members had been using to complete a report on the agency’s detention program, saying the move was part of an effort to intimidate the committee.


Feinstein is showing her stripes

She’s one of those tyranny types

With swastika crotch

Big Sis likes to watch

And ALL information she swipes

The Limerick King

Read Full Post »

The De Tocqueville Memorandum

“America is great because America is good, and if America ever ceases to be good, America ceases to be great.”

Philosophers tell us that we can reason backwards from our behavior to our First Principles to determine what guides us.

In this memorandum I seek to prove that the behavior of the United States government in the modern era can best be described as being ruled by Pure Evil and that the governing class in America seeks wherever possible to do the greatest harm to the greatest number of people. And I further intend to prove that this harm is in this present generation focused as much on the American people as it is on foreign nationals. Though I do grant that people overseas have cause for complaint.

America was founded upon the belief in life, liberty and the pursuit of happiness. Today life is not cherished, liberty is denied and happiness will soon be unattainable.

I will follow the popular trend and offer a list of ten reasons why I believe America is being ruled by men dedicated to the propagation of Evil.

1) America has used Depleted Uranium weapons in combat since 1991. DU weapons have been discovered in test firing ranges from Hawaii to Puerto Rico. Dick Cheney according to Leuren Moret used to get reports daily on DU air sample levels from Iraq. He ordered DU bombs to be dropped in or near towns like Fallujah if their radiation levels dropped too low.

The above photo is of a foreign baby born in Iraq after the occupation. The image below is from the son of an American who served in Iraq. This American child was likely damaged by the presence of DU in his father’s body. The US House and Senate since 1991 has done nothing to stop the use of DU despite the obvious dangers to Americans who serve in the military and their families or to people living near firing ranges.

2) The United States is funding Al Qaeda. In fact Al Qaeda or the base was never anything but a database or list of Arabs willing to work for America and Great Britain. Zbigniew Brzezinski used Al Qaeda to entice the Soviet Union into invading Afghanistan. That policy led to the deaths of more than 4 million Afghans. Mass murder is just one foundation of America’s foreign policy.

Currently, the US is funding Al Qaeda which is torturing and killing Syrians. American taxpayers are paying mercenaries to behead Christians and to gouge out their eyes. They are destroying Christian churches which were founded as far back as 50 A.D. Yet the threat of our Al Qaeda mercenaries is ostensibly why TSA has the right to grope the genitals of airline passengers. The real reason is to acclimate Americans to a future where the police have the right to sexually assault you and your children, to  torture you and  to kill you.

3) Whenever the American government needs to justify the violation of the Bill of Rights or the commission of an atrocity, mention is made of 911. BBC went on air 22 minutes before the collapse of WTC Tower 7 on 911 to announce that it had already fallen down. The Rothschild owned Reuters news agency had told BBC that WTC 7 had collapsed before it did. Tower 7 was not hit by an airplane. The BBC mentioned debris from Towers 1 and 2. But look at this brief video of the collapse. There is no visible debris damage. This building was obviously taken down by a controlled demolition. The video  below would have compelled a nation that had not been occupied by a foreign power to arrest everyone who allowed this atrocity to happen.

4) I mentioned America as being occupied by a foreign power. Some trace the occupation of America to 11-22-1963 and the assassination of President Kennedy. The Occupied media went on air that day and said that the President had been shot by a lone assassin firing from the Texas School Book Depository behind the motorcade. The best Marine Corps snipers from the Vietnam war tried at Quantico to re-create the assassination as dictated by the Warren Commission. Those Marine Corps snipers could not make the fatal shots even with superior weapons. Dan Rather went on CBS radio and described to the radio audience what he saw from the Zapruder film. He said clearly the President’s head was being forced forward by the impact of bullets from behind him. Life magazine took photos of the assassination in the order of 1-2-3 and published them on their cover in the order 3-2-1 so they could convince the people that there was no conspiracy and no coup.

If Mordecai Vanunu were allowed out of Israel, we could have a video of his declaration that Israeli Prime Minister David Ben Gurion order the assassination of JFK because the American President opposed Israel’s acquisition of nuclear weapons. The widespread nature of this conspiracy is easily proven by the following JFK Secret Service stand down video below.

5) Others trace the occupation of America to November 22, 1910 which was the date of the first meeting to draft the legislation that became the Federal Reserve Act. Under America’s banking system the commoners are charged interest on money the banks created out of nothing. This transfers wealth from small businesses, farmers and workers to the Bankers. Under fractional reserve banking every dollar in deposits allows the banker to loan out 10 ten dollars at interest. Please note the Banker is only paying interest on one dollar but is collecting on ten. This interest rate gouging leads to mountains of Unpayable Debts which in turn causes Depressions.

A Depression is a time in history when Unpayable Debts are cancelled. There are three ways to cancel debts. One is Hyperinflation as in the Weimar Republic. This leads to mass starvation and to war. The second is to foreclose on farms and home mortgages and to declare bankruptcy defaulting on debts. This led to the death by starvation of 3 million Americans during the 1930s and to WW II which killed 58 million human beings for no good reason.

There is a third way out of a Depression. The Babylonians canceled Unpayable Debts by law and recovered economically without suffering either mass starvation or war. But that method is unknown to anyone who attends American schools or listens to U.S. media. That is why I have concluded that America has both a Banker Occupied Government and Media.

6) After World War II, General Eisenhower had his troops set barbed wire up around open fields. He placed more than a million Germans into the camps and starved them to death with no protection against rain, snow and cold. Most of these men were soldiers but some were not. General Eisenhower was of Jewish descent.

7) At Yalta in March of 1945, Roosevelt, Churchill and Stalin who were all of Jewish descent agreed to forcibly repatriate Soviet Gentiles back to Russia where they were to be treated as traitors. Millions of these people were forced laborers who had been taken prisoner by the Germans. Captured Jews were in the concentration camps with the Gentiles. Auschwitz turned Silesian coal into gasoline using a Russian formula patented in 1915. Dachau had a satellite camp inside a mountain that made V2 rockers used to bomb London. The Jewish concentration camp inmates were permitted to go to Israel where they were given weapons and embarked on a genocidal ethnic cleansing program of the Palestinians which has continued to this day.

I remember reading an op-ed in the Wall Street Journal decades ago in which an American veteran wrote about the FOIA documents he received in which the US admitted to turning over 4 1/2 million refugees to the Soviets. One was a Russian who had served in the resistance to Franco and later joined the American Army as a sergeant and fought in North Africa and Italy. He was turned over to the Russians in Austria. American soldiers witnessed mass hangings of refugees they had turned over to the Russians in Germany.

I think this sufficiently demonstrates the Evil Nature of America’s Banker Occupied government. But let us continue as we would like to see what Destiny they have planned for us.

8) Societies can be measured by their ability to protect children from harm. America’s Banker Occupied Government (BOG) has dedicated itself to harming our children to the point of birth defects and even death. The Monsanto corporation has been allowed to produce Genetically Modified Organisms for human consumption. Tests of lab animals have shown that by the third generation the mice are either dear or sterile runts with multiple birth defects or dead. The great harm done to test subjects by GMO did not manifest before 120 days when adult mice began exhibiting tumors relatively large in size to their tiny bodies.

The Banker Occupied Government of the United States (BOGUS) allowed Monsanto to cut off their animal tests of GMO food after 90 days so lawmakers and the administration could deny the poisonous nature of our food. Any society that is willing to allow an Occupying Power to exterminate its children is cowardly. It goes without saying that the Occupying Power is Evil.

9) In 2001 BOG paid $75 million to Epicyte corporation as part of a campaign to sterilize adults and young children. Epicyte  corporation of San Diego spliced a protein from infertile Mexican women into corn. This technology was sold to Monsanto and DuPont and could also have been spliced into wheat, soy, rice or any other GMO crop. These international corporations have run amuck and have even spliced the genes of a spider into salmon. They have said they will release this into the wild without any study as Monsanto’s lawyer said it would be safe. The President of Epicyte in 2001 was Matt Hein who was Jewish. The sole reasoning behind splicing the Epicyte gene into our food supply is to carry out Henry Kissinger’s National Security Memorandum 200 of 1975. Henry Kissinger is Jewish and a wanted War Criminal. He has been described as a child molester in the Italian press.

10) 100,000 people a year worldwide die from heroin overdoses. The average age of a first time heroin user in the United States is 14. American taxpayers at great expense invaded and occupied Afghanistan. They also funded Global Hawk drones which are pilot-less versions of the U2 spy plane. Newer versions have compartments which permits BOG’s operatives to fly up to 3,400 pounds (1,542 kilograms) at a time around the world. This has led to an increase in drug purity and overdose deaths. The CIA, which is a primary subsidiary of BOG, flies cocaine and heroin into the US which it distributes to drug gangs along with weapons. This has unleashed a wave of violent crime in the homeland. There are 1.4 million drug gang members in the US.

This distribution of illegal drugs to enrich the ruling class was a fundamental feature of His Majesty’s Jewish Government which fought two opium wars against China in the 19th century. America has also fought two opium wars. The first was Vietnam and the second was Afghanistan. The Bankers launder a trillion dollars a year in illegal drugs and weapons. They also launder $500 billion a year in bribes so the commoners can never get what they need from their politicians.

Any government that sells heroin and guns to children in hopes of unleashing a crime wave against its law abiding citizens in order to make money is by definition Evil.

I think I have proven my point about the Evil Nature of those men who run the government of the United States. I have written elsewhere of Wall Street’s plans to ignite a Race War as soon as this current Depression hits us with full force. Millions of Americans and perhaps half a billion people overseas will die from starvation. At that point, BOG will release a series of plagues to cull the herd of a few billion commoners.

Anyone whether they be a billionaire or a worker or a soldier who does the bidding of this government is insane and could be prosecuted for War Crimes if we survive the plans of the Evil Ones.

Emergency Essentials/BePrepared

Read Full Post »

500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent

No matter which government conducts mass surveillance, they also do it to crush dissent, and then give a false rationale for why they’re doing it.

For example, the U.S. Supreme Court noted in Stanford v. Texas (1965):

While the Fourth Amendment [of the U.S. Constitution] was most immediately the product of contemporary revulsion against a regime of writs of assistance, its roots go far deeper. Its adoption in the Constitution of this new Nation reflected the culmination in England a few years earlier of a struggle against oppression which had endured for centuries. The story of that struggle has been fully chronicled in the pages of this Court’s reports, and it would be a needless exercise in pedantry to review again the detailed history of the use of general warrants as instruments of oppression from the time of the Tudors, through the Star Chamber, the Long Parliament, the Restoration, and beyond.


What is significant to note is that this history is largely a history of conflict between the Crown and the press. It was in enforcing the laws licensing the publication of literature and, later, in prosecutions for seditious libel, that general warrants were systematically used in the sixteenth, seventeenth, and eighteenth centuries. In Tudor England, officers of the Crown were given roving commissions to search where they pleased in order to suppress and destroy the literature of dissent, both Catholic and Puritan. In later years, warrants were sometimes more specific in content, but they typically authorized of all persons connected of the premises of all persons connected with the publication of a particular libel, or the arrest and seizure of all the papers of a named person thought to be connected with a libel.

By “libel”, the court is referring to a critique of the British government  which the King or his ministers didn’t like … they would label such criticism “libel” and then seize all of the author’s papers.

The Supreme Court provided interesting historical details in the case of Marcus v. Search Warrant (1961):

The use by government of the power of search and seizure as an adjunct to a system for the suppression of objectionable publications … was a principal instrument for the enforcement of the Tudor licensing system. The Stationers’ Company was incorporated in 1557 to help implement that system, and was empowered


“to make search whenever it shall please them in any place, shop, house, chamber, or building or any printer, binder or bookseller whatever within our kingdom of England or the dominions of the same of or for any books or things printed, or to be printed, and to seize, take hold, burn, or turn to the proper use of the aforesaid community, all and several those books and things which are or shall be printed contrary to the form of any statute, act, or proclamation, made or to be made. . . .


An order of counsel confirmed and expanded the Company’s power in 1566,  and the Star Chamber reaffirmed it in 1586 by a decree


“That it shall be lawful for the wardens of the said Company for the time being or any two of the said Company thereto deputed by the said wardens, to make search in all workhouses, shops, warehouses of printers, booksellers, bookbinders, or where they shall have reasonable cause of suspicion, and all books [etc.] . . . contrary to . . . these present ordinances to stay and take to her Majesty’s use. . . . ”


Books thus seized were taken to Stationers’ Hall where they were inspected by ecclesiastical officers, who decided whether they should be burnt. These powers were exercised under the Tudor censorship to suppress both Catholic and Puritan dissenting literature.


Each succeeding regime during turbulent Seventeenth Century England used the search and seizure power to suppress publications. James I commissioned the ecclesiastical judges comprising the Court of High Commission


“to enquire and search for . . . all heretical, schismatical and seditious books, libels, and writings, and all other books, pamphlets and portraitures offensive to the state or set forth without sufficient and lawful authority in that behalf, . . . and the same books [etc.] and their printing presses themselves likewise to seize and so to order and dispose of them . . . as they may not after serve or be employed for any such unlawful use. . . .”


The Star Chamber decree of 1637, reenacting the requirement that all books be licensed, continued the broad powers of the Stationers’ Company to enforce the licensing laws.  During the political overturn of the 1640′s, Parliament on several occasions asserted the necessity of a broad search and seizure power to control printing. Thus, an order of 1648 gave power to the searchers


“to search in any house or place where there is just cause of suspicion that Presses are kept and employed in the printing of Scandalous and lying Pamphlets, . . . [and] to seize such scandalous and lying pamphlets as they find upon search. . . .”


The Restoration brought a new licensing act in 1662. Under its authority, “messengers of the press” operated under the secretaries of state, who issued executive warrants for the seizure of persons and papers. These warrants, while sometimes specific in content, often gave the most general discretionary authority. For example, a warrant to Roger L’Estrange, the Surveyor of the Press, empowered him to “seize all seditious books and libels and to apprehend the authors, contrivers, printers, publishers, and dispersers of them,” and to


search any house, shop, printing room, chamber, warehouse, etc. for seditious, scandalous or unlicensed pictures, books, or papers, to bring away or deface the same, and the letter press, taking away all the copies. . . .]”




Although increasingly attacked, the licensing system was continued in effect for a time even after the Revolution of 1688, and executive warrants continued to issue for the search for and seizure of offending books. The Stationers’ Company was also ordered


“to make often and diligent searches in all such places you or any of you shall know or have any probable reason to suspect, and to seize all unlicensed, scandalous books and pamphlets. . . .”


And even when the device of prosecution for seditious libel replaced licensing as the principal governmental control of the press,  it too was enforced with the aid of general warrants — authorizing either the arrest of all persons connected with the publication of a particular libel and the search of their premises or the seizure of all the papers of a named person alleged to be connected with the publication of a libel.

And see this.

General warrants were largely declared illegal in Britain in 1765.  But the British continued to use general warrants in the American colonies.  In fact, the Revolutionary War was largely launched to stop the use of general warrants in the colonies.  King George gave various excuses of why general warrants were needed for the public good, of course … but such excuses were all hollow.

The New York Review of Books notes that the American government did not start to conduct mass surveillance against the American people until long after the Revolutionary War ended … but once started, the purpose was to crush dissent:

In the United States, political spying by the federal government began in the early part of the twentieth century, with the creation of the Bureau of Investigation in the Department of Justice on July 1, 1908. In more than one sense, the new agency was a descendant of the surveillance practices developed in France a century earlier, since it was initiated by US Attorney General Charles Joseph Bonaparte, a great nephew of Napoleon Bonaparte, who created it during a Congressional recess. Its establishment was denounced by Congressman Walter Smith of Iowa, who argued that “No general system of spying upon and espionage of the people, such as has prevailed in Russia, in France under the Empire, and at one time in Ireland, should be allowed to grow up.”


Nonetheless, the new Bureau became deeply engaged in political surveillance during World War I when federal authorities sought to gather information on those opposing American entry into the war and those opposing the draft. As a result of this surveillance, many hundreds of people were prosecuted under the 1917 Espionage Act and the 1918 Sedition Act for the peaceful expression of opinion about the war and the draft.


But it was during the Vietnam War that political surveillance in the United States reached its peak. Under Presidents Lyndon Johnson and, to an even greater extent, Richard Nixon, there was a systematic effort by various agencies, including the United States Army, to gather information on those involved in anti-war protests. Millions of Americans took part in such protests and the federal government—as well as many state and local agencies—gathered enormous amounts of information on them. Here are just three of the numerous examples of political surveillance in that era:

  • In the 1960s in Rochester, New York, the local police department launched Operation SAFE (Scout Awareness for Emergency). It involved twenty thousand boy scouts living in the vicinity of Rochester. They got identification cards marked with their thumb prints. On the cards were the telephone numbers of the local police and the FBI. The scouts participating in the program were given a list of suspicious activities that they were to report.
  • In 1969, the FBI learned that one of the sponsors of an anti-war demonstration in Washington, DC, was a New York City-based organization, the Fifth Avenue Peace Parade Committee, that chartered buses to take protesters to the event. The FBI visited the bank where the organization maintained its account to get photocopies of the checks written to reserve places on the buses and, thereby, to identify participants in the demonstration. One of the other federal agencies given the information by the FBI was the Internal Revenue Service.



The National Security Agency was involved in the domestic political surveillance of that era as well. Decades before the Internet, under the direction of President Nixon, the NSA made arrangements with the major communications firms of the time such as RCA Global and Western Union to obtain copies of telegrams. When the matter came before the courts, the Nixon Administration argued that the president had inherent authority to protect the country against subversion. In a unanimous decision in 1972, however, the US Supreme Court rejected the claim that the president had the authority to disregard the requirement of the Fourth Amendment for a judicial warrant.




Much of the political surveillance of the 1960s and the 1970s and of the period going back to World War I consisted in efforts to identify organizations that were critical of government policies, or that were proponents of various causes the government didn’t like, and to gather information on their adherents. It was not always clear how this information was used. As best it is possible to establish, the main use was to block some of those who were identified with certain causes from obtaining public employment or some kinds of private employment. Those who were victimized in this way rarely discovered the reason they had been excluded.


Efforts to protect civil liberties during that era eventually led to the destruction of many of these records, sometimes after those whose activities were monitored were given an opportunity to examine them. In many cases, this prevented surveillance records from being used to harm those who were spied on. Yet great vigilance by organizations such as the ACLU and the Center for Constitutional Rights, which brought a large number of court cases challenging political surveillance, was required to safeguard rights. The collection of data concerning the activities of US citizens did not take place for benign purposes.




Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them. The first target was the Communist Party of the United States, but subsequent targets ranged from the Reverend Martin Luther King, Jr. and his Southern Christian Leadership Conference to organizations espousing women’s rights to right wing organizations such as the National States Rights Party.


A well-known example of COINTELPRO was the FBI’s planting in 1964 of false documents about William Albertson, a long-time Communist Party official, that persuaded the Communist Party that Albertson was an FBI informant. Amid major publicity, Albertson was expelled from the party, lost all his friends, and was fired from his job. Until his death in an automobile accident in 1972, he tried to prove that he was not a snitch, but the case was not resolved until 1989, when the FBI agreed to pay Albertson’s widow $170,000 to settle her lawsuit against the government.


COINTELPRO was eventually halted by J. Edgar Hoover after activists broke into a small FBI office in Media, Pennsylvania, in 1971, and released stolen documents about the program to the press. The lesson of COINTELPRO is that any government agency that is able to gather information through political surveillance will be tempted to use that information. After a time, the passive accumulation of data may seem insufficient and it may be used aggressively. This may take place long after the information is initially collected and may involve officials who had nothing to do with the original decision to engage in surveillance.

Indeed, during the Vietnam war, the NSA spied on Senator Frank Church because of his criticism of the Vietnam War. The NSA also spied on Senator Howard Baker.

Senator Church – the head of a congressional committee investigating Cointelpro – warned in 1975:

[NSA’s] capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.  [If a dictator ever took over, the N.S.A.] could enable it to impose total tyranny, and there would be no way to fight back.

This is, in fact, what’s happened …

Initially, American constitutional law experts say that the NSA is doing exactly the same thing to the American people today which King George did to the Colonists … using “general warrant” type spying.

And it is clear that the government is using its massive spy programs in order to track those who question government policies. See this, this, this  and this.

Todd Gitlin – chair of the PhD program in communications at Columbia University, and a professor of journalism and sociology –  notes:

Under the Freedom of Information Act, the Partnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups — during the very time that they were missing actual warnings about actual terrorist actions.


From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI, and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places.  In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’”


Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center (BRIC), one of 77 coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily.  As the investigative journalist Michael Isikoff recently reported, they were not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’”


It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber.  That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either.  The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of…Code Pink and Veterans for Peace.




In Alaska, Alabama, Florida, Mississippi, Tennessee, and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations — and vice versa.


Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.”  Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.”  Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:


• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”


• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to… [22] campus police officials… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”


• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on Nov. 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services (NCIS) reported to DSAC on the relationship between OWS and organized labor.”


• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” ***


• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee, and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.


• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.”  Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’”




In 2010, the American Civil Liberties Union of Tennessee learned … that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents.  The letter encourages schools to be supportive of all religious beliefs during the holiday season.”




Consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’”




And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies.  According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’”  The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’


Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”




In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department Inspector General’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects.  The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.


“The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor.  He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.”


The sequel was not quite so droll.  The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.


Moreover, at least one fusion center has involved military intelligence in civilian law enforcement.  In 2009, a military operative from Fort Lewis, Washington, worked undercover collecting information on peace groups in the Northwest.  In fact, he helped run the Port Militarization Resistance group’s Listserv.  Once uncovered, he told activists there were others doing similar work in the Army.  How much the military spies on American citizens is unknown and, at the moment at least, unknowable.


Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos — I have some in my own heavily redacted files obtained through an FOIA request — were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case.  During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to Military Surveillance of Civilian Politics, 1967-70, an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews.  They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Yes, we hear echoes to the Cointelpro program of the 60s and 70s … as well as King George’s General Warrants to the Colonies … and the Star Chamber of 15th century England.

Because – whatever governments may say – mass surveillance is always used to crush dissent.

Read Full Post »

CIA BUSY IN RUSSIA? with videos here

The December 2013 bus bombing in Volgograd.

Arthur Atayev, of Russia’s Institute of Strategic Research says that the organisers of the attacks in VOLGOGRAD “are located outside Russia (presumably the CIA and its friends).


“And they have been launching destabilizing attacks in Russia for a long time in order to reduce its foreign policy influence…”

Peter Power, Managing Director of Crisis Management at Visor Consultants, says that the terrorists concentrate on obvious targets.

He says: “Volgograd is a transport hub for this part of Russia…

“So transport, communication, economy – all these issues are pretty obvious targets to hit and produce an immediate impact on the Russian public, and not only Russian but also for those who are travelling there next year.”
Cannabis Ad

Read Full Post »

CIA probe into Bay of Pigs should be kept secret – Obama admin

14 Dec 2013 Over 50 years after the Bay of Pigs invasion went awry, the US federal government is still attempting to keep secrets about the failed overthrow of the Cuban government, with an Obama administration lawyer arguing this week to keep a document classified. The National Security Archive, a private research institution, has sought to force the government to hand over the fifth of a five-volume internal account of the Bay of Pigs. Penned by a CIA staff historian in the years between 1973 and 1984, the final document chronicles – and presumably critiques – the CIA’s own investigation of how the invasion went wrong.

Read Full Post »

EXCLUSIVE: CIA Psychologist’s Notes Reveal True Purpose Behind Bush’s Torture Program


This diagram was included in a paper written by Dr. Bruce Jessen’s and shows his view of the conflicting psychological pressures bearing down on a prisoner who is held captive by an enemy. (Click here to view full image.)

December 7, 2013

Dr. Bruce Jessen’s handwritten notes describe some of the torture techniques that were used to “exploit” “war on terror” detainees in custody of the CIA and Department of Defense.

Bush administration officials have long asserted that the torture techniques used on “war on terror” detainees were utilized as a last resort in an effort to gain actionable intelligence to thwart pending terrorist attacks against the United States and its interests abroad.

But the handwritten notes obtained exclusively by Truthout drafted two decades ago by Dr. John Bruce Jessen, the psychologist who was under contract to the CIA and credited as being one of the architects of the government’s top-secret torture program, tell a dramatically different story about the reasons detainees were brutalized and it was not just about obtaining intelligence.

Jason Leopold interviews Jessen’s former SERE colleague, retired Air Force Capt. Michael Kearns.

Rather, as Jessen’s notes explain, torture was used to “exploit” detainees, that is, to break them down physically and mentally, in order to get them to “collaborate” with government authorities. Jessen’s notes emphasize how a “detainer” uses the stresses of detention to produce the appearance of compliance in a prisoner.

Click to view notes larger.

Click to view larger.

Indeed, a report released in 2009 by the Senate Armed Services Committee about the treatment of detainees in US custody said Jessen was the author of a “Draft Exploitation Plan” presented to the Pentagon in April 2002 that was implemetned  at Guantanamo and at prison facilities in Iraq and Afghanistan. But to what degree is unknown because the document remains classified. Jessen also co-authored a memo in February 2002 on “Prisoner Handling Recommendations” at Guantanamo, which is also classified.

Moreover, the Armed Services Committee’s report noted that torture techniques approved by the Bush administration were based on survival training exercises US military personnel were taught by individuals like Jessen if they were captured by an enemy regime and subjected to “illegal exploitation” in violation of the Geneva Conventions.

Jessen’s notes, prepared for an Air Force survival training course that he later “reverse engineered” when he helped design the Bush administration’s torture program, however, go into far greater detail than the Armed Services Committee’s report in explaining how prisoners would be broken down physically and psychologically by their captors. The notes say survival training students could “combat interrogation and torture” if they are captured by an enemy regime by undergoing intense training exercises, using “cognitive” and “exposure techniques” to develop “stress inoculation.” [Click here to download a PDF file of Jessen’s handwritten notes. Click here to download a zip file of Jessen’s notes in typewritten form.]

The documents stand as the first piece of hard evidence to surface in nine years that further explains the psychological aspects of the Bush administration’s torture program and the rationale for subjecting detainees to so-called “enhanced interrogation techniques.”

Jessen’s notes were provided to Truthout by retired Air Force Capt. Michael Kearns, a “master” SERE instructor and decorated veteran who has previously held high-ranking positions within the Air Force Headquarters Staff and Department of Defense (DoD).

Kearns and his boss, Roger Aldrich, the head of the Air Force Intelligence’s Special Survial Training Program (SSTP), based out of Fairchild Air Force Base in Spokane, Washington, hired Jessen in May 1989. Kearns, who was head of operations at SSTP and trained thousands of service members, said Jessen was brought into the program due to an increase in the number of new survival training courses being taught and “the fact that it required psychological expertise on hand in a full-time basis.”

“Special Mission Units”

Jessen, then the chief of Psychology Service at the US Air Force Survival School, immediately started to work directly with Kearns on “a new course for special mission units (SMUs), which had as its goal individual resistance to terrorist exploitation.”

The course, known as SV-91, was developed for the Survival Evasion Resistance Escape (SERE) branch of the US Air Force Intelligence Agency, which acted as the Executive Agent Action Office for the Joint Chiefs of Staff. Jessen’s notes formed the basis for one part of SV-91, “Psychological Aspects of Detention.”

Special mission units fall under the guise of the DoD’s clandestine Joint Special Operations Command (JSOC) and engage in a wide-range of highly classified counterterrorist and covert operations, or “special missions,” around the world, hundreds of who were personally trained by Kearns. The SV-91 course Jessen and Kearns were developing back in 1989 would later become known as “Special Survival for Special Mission Units.”

Before the inception of SV-91, the primary SERE course was SV-80, or Basic Combat Survival School for Resistance to Interrogation, which is where Jessen formerly worked. When Jessen was hired to work on SV-91, the vacancy at SV-80 was filled by psychologist Dr. James Mitchell, who was also contracted by the CIA to work at the agency’s top-secret black site prisons in Europe employing SERE torture techniques, such as the controlled drowning technique know as waterboarding, against detainees.

While they were still under contract to the CIA, the two men formed the “consulting” firm Mitchell, Jessen & Associates in March 2005. The “governing persons” of the company included Kearns’ former boss, Aldrich, SERE contractor David Tate, Joseph Matarazzo, a former president of the American Psychological Association and Randall Spivey, the ex-chief of Operations, Policy and Oversight Division of JPRA.

Mitchell, Jessen & Associates’ articles of incorporation have been “inactive” since October 22, 2009 and the business is now listed as “dissolved,” according to Washington state’s Secretary of State website.

Capt. Michael Kearns (left) and Dr. Bruce Jessen at Fort Bragg’s Nick Rowe SERE Training Center, 1989. Photo courtesy of retired Air Force Capt. Michael Kearns.

Lifting the “Veil of Secrecy”

Kearns was one of only two officers within DoD qualified to teach all three SERE-related courses within SSTP on a worldwide basis, according to a copy of a 1989 letter written by Aldrich, who nominated Kearns officer of the year.

He said he decided to come forward because he is outraged that Jessen used their work to help design the Bush administration’s torture program.

“I think it’s about time for SERE to come out from behind the veil of secrecy if we are to progress as a moral nation of laws,” Kearns said during a wide-ranging interview with Truthout. “To take this survival training program and turn it into some form of nationally sanctioned, purposeful program for the extraction of information, or to apply exploitation, is in total contradiction to human morality, and defies basic logic. When I first learned about interrogation, at basic intelligence training school, I read about Hans Scharff, a Nazi interrogator who later wrote an article for Argosy Magazine titled ‘Without Torture.’ That’s what I was taught – torture doesn’t work.”

What stands out in Jessen’s notes is that he believed torture was often used to produce false confessions. That was the end result after one high-value detainee who was tortured in early 2002 confessed to having information proving a link between the late Iraqi dictator Saddam Hussein and al-Qaeda, according to one former Bush administration official.

It was later revealed, however, that the prisoner, Ibn al-Shaykh al-Libi, had simply provided his captors a false confession so they would stop torturing him. Jessen appeared to be concerned with protecting the US military against falling victim to this exact kind of physical and psychological pressure in a hostile detention environment, recognizing that it would lead to, among other things, false confessions.

In a paper Jessen wrote accompanying his notes, “Psychological Advances in Training to Survive Captivity, Interrogation and Torture,” which was prepared for the symposium: “Advances in Clinical Psychological Support of National Security Affairs, Operational Problems in the Behavioral Sciences Course,” he suggested that additional “research” should be undertaken to determine “the measurability of optimum stress levels in training students to resist captivity.”

“The avenues appear inexhaustible” for further research in human exploitation, Jessen wrote.

Such “research” appears to have been the main underpinning of the Bush administration’s torture program. The experimental nature of these interrogation methods used on detainees held at Guantanamo and at CIA black site prisons have been noted by military and intelligence officials. The Armed Services Committee report cited a statement from Col. Britt Mallow, the commander of the Criminal Investigative Task Force (CITF), who noted that Guantanamo officials Maj. Gen. Mike Dunleavy and Maj. Gen. Geoffrey Miller used the term “battle lab” to describe the facility, meaning “that interrogations and other procedures there were to some degree experimental, and their lessons would benefit [the Department of Defense] in other places.”

What remains a mystery is why Jessen took a defensive survival training course and assisted in turning it into an offensive torture program.

Truthout attempted to reach Jessen over the past two months for comment, but we were unable to track him down. Messages left for him at a security firm in Alexandria, Virginia he has been affiliated with were not returned and phone numbers listed for him in Spokane were disconnected.

A New Emphasis on Terrorism

SV-91 was developed to place a new emphasis on terrorism as SERE-related courses pertaining to the cold war, such as SV-83, Special Survival for Sensitive Reconnaissance Operations (SRO), whose students flew secret missions over the Soviet Union, Eastern Bloc, and other communist countries, were being scaled back.

The official patch of the Special Survival Training ProgramThe official coin of the Special Survival Training Program

The official patch and coin of the Special Survival Training Program. (Photo courtesy of retired Air Force Capt. Michael Kearns)

SSTP evolved into the Joint Personnel Recovery Agency (JPRA), the DoD’s executive agency for SERE training, and was tapped by DoD General Counsel William “Jim” Haynes in 2002 to provide the agency with a list of interrogation techniques and the psychological impact those methods had on SERE trainees, with the aim of utilizing the same methods for use on detainees. Aldrich was working in a senior capacity at JPRA when Haynes contacted the agency to inquire about SERE.

The Army also runs a SERE school as does the Navy, which had utilized waterboarding as a training exercise on Navy SERE students that JPRA recommended to DoD as one of the torture techniques to use on high-value detainees.

Kearns said the value of Jessen’s notes, particularly as they relate to the psychological aspects of the Bush administration’s torture program, cannot be overstated.

“The Jessen notes clearly state the totality of what was being reverse-engineered – not just ‘enhanced interrogation techniques,’ but an entire program of exploitation of prisoners using torture as a central pillar,” he said. “What I think is important to note, as an ex-SERE Resistance to Interrogation instructor, is the focus of Jessen’s instruction. It is exploitation, not specifically interrogation. And this is not a picayune issue, because if one were to ‘reverse-engineer’ a course on resistance to exploitation then what one would get is a plan to exploit prisoners, not interrogate them. The CIA/DoD torture program appears to have the same goals as the terrorist organizations or enemy governments for which SV-91 and other SERE courses were created to defend against: the full exploitation of the prisoner in his intelligence, propaganda, or other needs held by the detaining power, such as the recruitment of informers and double agents. Those aspects of the US detainee program have not generally been discussed as part of the torture story in the American press.”

Ironically, in late 2001, while the DoD started to make inquiries about adapting SERE methods for the government’s interrogation program, Kearns received special permission from the US government to work as an intelligence officer for the Australian Department of Defence to teach the Australian Special Air Service (SAS) how to use SERE techniques to resist interrogation and torture if they were captured by terrorists. Australia had been a staunch supporter of the invasion of Afghanistan and sent troops there in late 2001.

Kearns, who recently waged an unsuccessful Congressional campaign in Colorado, was working on a spy novel two years ago and dug through boxes of “unclassified historical materials on intelligence” as part of his research when he happened to stumble upon Jessen’s notes for SV-91. He said he was “deeply shocked and surprised to see I’d kept a copy of these handwritten notes as certainly the originals would have been destroyed (shredded)” once they were typed up and made into proper course materials.

“I hadn’t seen these notes for over twenty years,” he said. “However, I’ll never forget that day in September 2009 when I discovered them. I instantly felt sick, and eventually vomited because I felt so badly physically and emotionally that day knowing that I worked with this person and this was the material that I believe was ‘reverse-engineered’ and used in part to design the torture program. When I found the Jessen papers, I made several copies and sent them to my friends as I thought this could be the smoking gun, which proves who knew what and when and possibly who sold a bag of rotten apples to the Bush administration.”

Kearns was, however, aware of the role SERE played in the torture program before he found Jessen’s notes, and in July 2008, he sent an email to the chairman of the Armed Services Committee, Sen. Carl Levin, who was investigating the issue and offered to share information with Levin about Jessen and the SERE program in general. The Michigan Democrat responded to Kearns saying he was “concerned about this issue” and that he “needed more information on the subject,” but Levin never followed up when Kearns offered to help.

“I don’t know how it went off the tracks, but the names of the people who testified at the Senate Armed Services, Senate Judiciary, and Select Intelligence committees were people I worked with, and several I supervised,” Kearns said. “It makes me sick to know people who knew better allowed this to happen.”

Levin’s office did not return phone calls or emails for comment. However, the report he released in April 2009, “Inquiry Into the Treatment of Detainees in US Custody,” refers to SV-91. The report includes a list of acronyms used throughout the report, one of which is “S-V91,” identified as “the Department of Defense High Risk Survival Training” course. But there is no other mention throughout the report of SV-91 or the term “High Risk Survival Training,” possibly due to the fact that sections of the report where it is discussed remain classified. Still, the failure by Levin and his staff to follow up with Kearns–the key military official who had retained Jessen’s notes and helped develop the very course those notes were based upon that was cited in the report–suggests Levin’s investigation is somewhat incomplete.

Control and Dependence

A copy of the syllabus for SV-91, obtained by Truthout from another source who requested anonymity, states that the class was created “to provide special training for selected individuals that will enable them to withstand exploitation methods in the event of capture during peacetime operations…. to cope with such exploitation and deny their detainers useable information or propaganda.”

Although the syllabus focuses on propaganda and interrogation for information as the primary means of exploiting prisoners, Jessen’s notes amplify what was taught to SERE students and later used against detainees captured after 9/11 . He wrote that a prisoner’s captors seek to “exploit” the prisoner through control and dependence.

“From the moment you are detained (if some kind of exploitation is your Detainer’s goal) everything your Detainer does will be contrived to bring about these factors: CONTROL, DEPENDENCY, COMPLIANCE AND COOPERATION,” Jessen wrote. “Your detainer will work to take away your sense of control. This will be done mostly by removing external control (i.e., sleep, food, communication, personal routines etc. )…Your detainer wants you to feel ‘EVERYTHING’ is dependent on him, from the smallest detail, (food, sleep, human interaction), to your release or your very life … Your detainer wants you to comply with everything he wishes. He will attempt to make everything from personal comfort to your release unavoidably connected to compliance in your mind.”

Jessen wrote that cooperation is the “end goal” of the detainer, who wants the detainee “to see that [the detainer] has ‘total’ control of you because you are completely dependent on him, and thus you must comply with his wishes. Therefore, it is absolutely inevitable that you must cooperate with him in some way (propaganda, special favors, confession, etc.).”

Jessen described the kinds of pressures that would be exerted on the prisoner to achieve this goal, including “fear of the unknown, loss of control, dehumanization, isolation,” and use of sensory deprivation and sensory “flooding.” He also included “physical” deprivations in his list of detainer “pressures.”

“Unlike everyday experiences, however, as a detainee we could be subjected to stressors/coercive pressures which we cannot completely control,” he wrote. “If these stressors are manipulated and increased against us, the cumulative effect can push us out of the optimum range of functioning. This is what the detainer wants, to get us ‘off balance.’”

“The Detainer wants us to experience a loss of composure in hopes we can be manipulated into some kind of collaboration…” Jessen wrote. “This is where you are most vulnerable to exploitation. This is where you are most likely to make mistakes, show emotions, act impulsively, become discouraged, etc. You are still close enough to being intact that you would appear convincing and your behavior would appear ‘uncoerced.’”

Kearns said, based on what he has read in declassified government documents and news reports about the role SERE played in the  Bush administration’s torture program, Jessen clearly “reverse-engieered” his lesson plan and used resistance methods to abuse “war on terror” detainees.

The SSTP course was “specifically and intentionally designed to assist American personnel held in hostile detention,” Kearns said. It was “not designed for interrogation, and certainly not torture. We were not interrogators we were ‘role-players’ who introduced enemy exploitation techniques into survival scenarios as student learning objectives in what could be called Socratic-style dilemma settings. More specifically, resistance techniques were learned via significant emotional experiences, which were intended to inculcate long-term valid and reliable survival routines in the student’s memory. The one rule we had was ‘hands off.’ No (human intelligence) operator could lay hands on a student in a ‘role play scenario’ because we knew they could never ‘go there’ in the real world.”

But after Jessen was hired, Kearns contends, Aldrich immediately trained him to become a mock interrogator using “SERE harsh resistance to interrogation methods even though medical services officers were explicitly excluded from the ‘laying on’ of hands in [resistance] ‘role-play’ scenarios.”

Aldrich, who now works with the Center for Personal Protection & Safety in Spokane, did not return calls for comment.

“Torture Paper”

The companion paper Jessen wrote included with his notes, which was also provided to Truthout by Kearns, eerily describes the same torturous interrogation methods US military personnel would face during detention that Jessen and Mitchell “reverse engineered” a little more than a decade later and that the CIA and DoD used against detainees.

Indeed, in a subsection of the paper, “Understanding the Prisoner of War Environment,” Jessen notes how a prisoner will be broken down in an attempt to get him to “collaborate” with his “detainer.”

“This issue of collaboration is ‘the most prominent deliberately controlled force against the (prisoner of war),” Jessen wrote. “The ability of the (prisoner of war) to successfully resist collaboration and cope with the obviously severe approach-avoidance conflict is complicated in a systematic and calculated way by his captors.

“These complications include: Threats of death, physical pressures including torture which result in psychological disturbances or deterioration, inadequate diet and sanitary facilities with constant debilitation and illness, attacks on the mental health via isolation, reinforcement of anxieties, sleeplessness, stimulus deprivation or flooding, disorientation, loss of control both internal and external locus, direct and indirect attack on the (prisoner of war’s) standards of honor, faith in himself, his organization, family, country, religion, or political beliefs … Few seem to be able to hold themselves completely immune to such rigorous behavior throughout all the vicissitudes of long captivity. Confronted with these conditions, the unprepared prisoner of war experiences unmanageable levels of fear and despair.”

“Specific (torture resistance) techniques,” Jessen wrote, “taught to and implemented by the military member in the prisoner of war setting are classified” and were not discussed in the paper he wrote. He added, “Resistance Training students must leave training with useful resistance skills and a clear understanding that they can successfully resist captivity, interrogation or torture.”

Kearns also declined to cite the specific interrogation techniques used during SERE training exercises because that information is still classified. Nor would he comment as to whether the interrogations used methods that matched or were similar to those identified in the August 2002 torture memo prepared by former Justice Department attorneys John Yoo and Jay Bybee.

However, according to the Senate Armed Services Committee report “SERE resistance training … was used to inform” Yoo and Bybee’s torture memo, specifically, nearly a dozen of the brutal techniques detainees were subjected to, which included waterboarding, sleep deprivation, painful stress positions, wall slamming and placing detainees in a confined space, such as a container, where his movement is restricted. The CIA’s Office of Technical Services told Yoo and Bybee the SERE techniques used to inform the torture memo were not harmful, according to declassified government documents.

Many of the “complications,” or torture techniques, Jessen wrote about, declassified government documents show, became a standard method of interrogation and torture used against all of the high-value detainees in custody of the CIA in early 2002, including Abu Zubaydah and self-professed 9/11 mastermind Khalid Sheikh Mohammed, as well as detainees held at Guantanamo and prison facilities in Iraq and Afghanistan.

The issue of “collaborating” with one’s detainer, which Jessen noted was the most important in terms of controlling a prisoner, is a common theme among the stories of detainees who were tortured and later released from Guantanamo.

For example, Mamdouh Habib, an Australian citizen who was rendered to Egypt and other countries where he was tortured before being sent to Guantanamo, wrote in his memoir, “My Story: the Tale of a Terrorist Who Wasn’t,” after he was released without charge, that interrogators at Guantanamo “tried to make detainees mistrust one another so that they would inform on each other during interrogation.”

Binyam Mohamed, am Ethiopian-born British citizen, who the US rendered to a black site prison in Morocco, said that a British intelligence informant, a person he knew and who was recurited, came to him in his Moroccan cell and told him that if he became an intelligence asset for the British, his torture, which included scalpel cuts to his penis, would end. In December 2009, British government officials released documents that show Mohamed was subjected to SERE torture techniques during his captivity in the spring of 2002.

Abdul Aziz Naji, an Algerian prisoner at Guantanamo until he was forcibly repatriated against his wishes to Algeria in July 2010, told an Algerian newspaper that “some detainees had been promised to be granted political asylum opportunity in exchange of [sic] a spying role within the detention camp.”

Mohamedou Ould Salahi, whose surname is sometimes spelled “Slahi,” is a Mauritanian who was tortured in Jordan and Guantanamo. Investigative journalist Andy Worthington reported that Salahi was subjected to “prolonged isolation, prolonged sleep deprivation, beatings, death threats, and threats that his mother would be brought to Guantanamo and gang-raped” unless he collaborated with his interrogators. Salahi finally decided to become an informant for the US in 2003. As a result, Salahi was allowed to live in a special fenced-in compound, with television and refrigerator, allowed to garden, write and paint, “separated from other detainees in a cocoon designed to reward and protect.”

Still, despite collaborating with his detainers, the US government mounted a vigorous defense against Salahi’s petition for habeas corpus. His case continues to hang in legal limbo. Salahi’s fate speaks to the lesson Habib said he learned at Guantanamo: “you could never satisfy your interrogator.” Habib felt informants were never released “because the Americans used them against the other detainees.”

Jessen’s and Mitchell’s mutimillion dollar government contract was terminated by CIA Director Leon Panetta in 2009. According to an Associated Press report, the CIA agreed to pay – to the tune of $5 million – the legal bills incurred by their consulting firm.

Recently a complaint filed against Mitchell with the Texas State Board of Examiners of Psychologists by a San Antonio-based psychologist, an attorney who defended three suspected terrorists imprisoned at Guantanamo and by Zubaydah’s attorney Joseph Margulies. Their complaint sought to strip Mitchell of his license to practice psychology for violating the board’s rules as a result of the hands-on role he played in torturing detainees, was dismissed due to what the board said was a lack of evidence. Mitchell, who lives in Florida, is licensed in Texas. A similar complaint against Jessen may soon be filed in Idaho, where he is licensed to practice psychology.

Kearns, who took a graduate course in cognitive psychotherapy in 1988 taught by Jessen, still can’t comprehend what motivated his former colleague to turn to the “dark side.”

“Bruce Jessen knew better,” Kearns said, who retired in 1991 and is now working on his Ph.D in educational psychology. “His duplicitous act is appalling to me and shall haunt me for the rest of my life.

Read Full Post »

Read Full Post »

JFK nephew names ‘rogue CIA’ in JFK assassination plot

09 Nov 2013 Journalist Russ Baker, author of the best-selling “Family of Secrets: The Bush Dynasty, America’s Invisible Government,” has unearthed the startling coincidence that Lee Harvey Oswald’s principle handler, after he arrived back in the states from self-imposed exile in the Soviet Union, was George de Mohrenschildt, and that De Mohrenschildt’s nephew had roomed with George H. W. Bush at Phillips Academy in Andover, Massachusetts… An unusual assortment of national political figures were in or around Dallas on the day of the assassination or the day prior to it, including J. Edgar Hoover, according to William Penn Jones, an Army Brigadier General and owner of the Midlothian Mirror, Richard Nixon, according to a Pepsi Cola executive whose convention Nixon spoke at the night before, and George HW Bush, at that time a CIA operative. Nixon’s recollections of the day have been inconsistent, and HW Bush initially said that he did not recall where he was on that day, although Russ Baker shows that he was in Dallas but concocting elaborate “alibis.”

Read Full Post »

Perpetual occupation of Afghanistan: US to keep troops in place and funds flowing, perhaps indefinitely

–Billions of US tax dollars would be ‘managed by relevant Afghan institutions’ [Right, because they’ve managed it *so well* (most of it missing) all along!]

19 Nov 2013 While many Americans have been led to believe the war in Afghanistan will soon be over [Obusha lied], a draft of a key U.S.-Afghan security deal obtained by NBC News shows the United States is prepared to maintain military outposts in Afghanistan for many years to come, and pay to support hundreds of thousands of Afghan security forces [and the US mercenaries to train them]. The wide-ranging document [‘Security and Defense Cooperation Agreement Between the United States of America and the Islamic Republic of Afghanistan‘], still unsigned by the United States and Afghanistan, has the potential to commit thousands of American troops to Afghanistan and spend billions of U.S. taxpayer dollars. The document outlines what appears to be the start of a new, open-ended military commitment in Afghanistan in the name of training and continuing to fight foment al-Qaeda [al-CIAduh].

[USociopaths want to slash Social Security and food stamps, while citizens FOREVER fund the CIA’s poppy fields in Afghanistan? This will not fly.

Read Full Post »


Read Full Post »

Older Posts »

%d bloggers like this: