Aletho News

ΑΛΗΘΩΣ

9/11 Trillions: Follow The Money

By James Corbett | 9/11/2015

TRANSCRIPT AND SOURCES

Forget for one moment everything you’ve been told about September 11, 2001. Instead let’s ask ourselves one question: What was 9/11? A terrorist atrocity? An attack on America? The first salvo in a new war? “A day that changed everything”?

The question may seem simple, but how we answer it is of vital importance. It determines how we proceed with our investigation of that day. And once you strip away the emotional rhetoric and the fear-inducing imagery, we’re left with a simple truth: 9/11 was a crime. And as with any crime, there is one overriding imperative that detectives must follow to identify the perpetrators: Follow the money.

This is an investigation of the 9/11 money trail.

The 9/11 Heist

In 1998, the Port Authority of New York and New Jersey agreed to privatize the World Trade Center, the complex of office towers in Lower Manhattan that they had owned and operated since their construction in 1973. In April 2001 an agreement was reached with a consortium of investors led by Silverstein Properties, and on July 24th, 2001, Larry Silverstein, who already owned World Trade Center Building 7, signed a 99-year lease for the Twin Towers and Buildings 4 and 5.

The lease was for $3.2 billion and was financed by a bridge loan from GMAC, the commercial mortgage arm of General Motors, as well as $111 million from Lloyd Goldman and Joseph Cayre, individual real estate investors. Silverstein Properties only put down $14 million of its own money.

The deal was unusual in a variety of ways. Although the Port Authority carried only $1.5 billion of insurance coverage on the WTC complex, which earlier that year had been valued at $1.2 billion, Silverstein had insisted on doubling that amount, insuring the buildings for $3.55 billion. Silverstein’s insurance broker struggled to put that much coverage in place and ultimately had to split it among 25 dealers. The negotiations were so involved that only temporary contracts were in place for the insurance at the time the lease was signed, and by September the contracts were still being finalized.

Silverstein’s group was also explicitly given the right to rebuild the structures if they were destroyed—and even to expand the amount of retail space on the site if rebuilding did take place.

Within hours of the destruction of the Twin Towers on September 11th, Silverstein was on the phone to his lawyers, trying to determine if his insurance policies could “construe the attacks as two separate, insurable incidents rather than one.” Silverstein spent years in the courts attempting to win $7.1 billion from his $3.55 billion insurance policy and in 2007 walked away with $4.55 billion, the largest single insurance settlement ever. As soon as the deal was announced, Silverstein sued United and American Airlines for a further $3.5 billion for their “negligence” in the 9/11 attacks, a claim that was struck down by the courts but is still on appeal.

Perhaps even more outrageously, in a secret deal in 2003, the Port Authority agreed to pay back 80% of their initial equity in the lease, but allowed the Silverstein group to maintain control of the site. The deal gave Silverstein, Goldman and Cayre $98 million of the $125 million they put down on the lease, and a further $130 million in insurance proceeds that were earmarked for the site’s rebuilding.

In the end, Silverstein profited from the 9/11 attacks to the tune of $4.55 billion and counting.

But that’s the 9/11 insurance heist you saw. There was a much deeper, more complex, and well-hidden heist that was taking place behind closed doors on September 11, 2001, deep in the heart of the World Trade Center itself.

Marsh & McLennan is a diversified risk, insurance and professional services firm with over $13 billion in annual revenue and 57,000 employees. In September of 2001, 2,000 of those employees worked in Marsh’s offices in the World Trade Center. Marsh occupied floors 93 to 100 of the North Tower, the exact area of the impact and explosion.

In the year prior to 9/11, Marsh had contracted with SilverStream software to create an electronic connection between Marsh and its clients for the purpose of creating “paperless transactions.” SilverStream had already built internet-based transactional and trading platforms for Merrill Lynch, Deutsche Bank, Banker’s Trust, Alex Brown, Morgan Stanley and other financial services firms that were later involved in 9/11, but this new project was unlike anything that had been attempted before.

Richard Andrew Grove, the salesperson who handled the Marsh & McLennan project for SilverStream, explains.

RICHARD GROVE: In 2000 SilverStream was contracted by Marsh to provide a technological solution beyond what we had done for any of the above-named companies; insofar as it would be used to electronically connect Marsh to its major business partners via internet portals, for the purpose of creating “paperless transactions” and expediting revenue and renewal cycles, and built from the ground up at the client’s site.

SilverStream provided a specific type of connectivity that was used to link AIG and Marsh & McLennan—the first two commercial companies on the planet to employ this type of transaction—and in fact Marsh was presented with something called the ACORD Award in the summer of 2001 for being the first commercial corporation to do so…. And what you should take away from that is this: it means that no other companies were doing this type of transaction. So the question in your mind should be: What then were Marsh and AIG doing, and why did they need to leverage technologies that no other commercial entity on the face of the earth needed to conduct business?

Once securing the contract, SilverStream then stationed approximately 30-to-40 developers at Marsh, and this team was led by two-to-three managers, with whom I liaised to ensure delivery of the “solution” that was promised. The development team regularly worked late into the night, if not all night, and sometimes worked seven days a week in order to adhere to Marsh’s indicated pre-September 11th deadline.

(SOURCE: Project Constellation)

But it was not long before severe irregularities in the billing of the account for this project led Richard Grove into the heart of a deeper mystery about the software, and about the work he was engaged in.

RICHARD GROVE: I first noticed fiscal anomalies with respect to the Marsh.com project, when I was in a meeting on the 98th floor in October of 2000 with a gentleman named Gary Lasko. Gary was Marsh’s North American Chief Information Officer, and that particular afternoon a colleague and I helped him identify about $10,000,000 in suspicious purchase orders—after I recognized that certain vendors were deceiving Marsh, and specifically appeared to be selling Marsh large quantities of hardware that were not necessary, as this was later confirmed by Gary.

I brought my concerns up to executives inside of SilverStream, and I was urged to keep quiet and mind my own business. I went to an executive at Marsh, and he advised me to do likewise…. But then I mentioned it to a few executives at Marsh whom I could trust—ike Gary Lasko…and Kathryn Lee, Ken Rice, Richard Breuhardt, John Ueltzhoeffer—people who became likewise concerned that something untoward was going on.

The concerned colleagues I just mentioned were murdered on September 11th, and the executives who expressed dismay at my concerns are alive and free today because of it.

I feel that it’s no coincidence, as the Marsh executive who urged me to drop my line of inquiry made sure that his personnel, who I just mentioned, were in the office bright and early for a global conference call before the staff meeting upon which I was to intrude—a conference call which I was informed this executive in question conducted but attended from the safety of his Upper West Side apartment.

(SOURCE: Project Constellation)

The global conference call with Marsh’s IT staff on the morning of 9/11, a meeting that included the staff who were investigating the suspicious billing on the SilverStream deal, was confirmed in a 2006 interview with Marsh’s then-Chief Information Officer, Ellen Clarke.

Richard Grove had been asked to attend the meeting but was stuck in traffic on the way to the Towers when the attack began. His friends at Marsh were not so lucky: 294 Marsh employees, including all of the participants in the conference call in the North Tower, died that morning. Meanwhile the Marsh executive who had scheduled the meeting, the same one who had asked Grove to drop the issue of the billing anomalies, was safe in his apartment, attending the meeting via telephone.

So what was the Marsh.com project really about? Why was it so important for it to be finished before September 11th, and what kind of transactions did it enable? More importantly, what information was lost when the data center on the 95th floor of the North Tower suffered a direct hit on 9/11 and the buildings were demolished?

A partial answer comes from reports that emerged in late 2001: that a German firm, Convar, had been hired to reconstruct financial data from the hard disks recovered at Ground Zero. The firm talks about this work in its promotional videos.

September the 11th, 2001. The whole world is in shock following the attacks on the World Trade Center. Convar has some solutions to offer.

Data stored on countless hard drives retrieved from the collapsed towers was believed to have been lost, but Convar’s specialists can render irreplaceable information readable again at Europe’s only high-security data recovery center. Burnt, crushed or dirty storage media are ready to relinquish their secrets by the time we finish.

(SOURCE: CONVAR – Repair & Service Center)

More details on the work come from an IDG News Service story posted to CNN.com in December 2001. Under the headline “Computer disk drives from WTC could yield clues,” the article notes: “An unexplained surge in transactions was recorded prior to the attacks, leading to speculation that someone might have profited from previous knowledge of the terrorist plot by moving sums of money. But because the facilities of many financial companies processing the transactions were housed in New York’s World Trade Center, destroyed in the blasts, it has until now been impossible to verify that suspicion.”

A Reuters article from the same time, later posted to Convar’s website, offers revealing glimpses into the investigation’s early results. It quotes Peter Herschel, Convar’s director at the time.

“The suspicion is that inside information about the attack was used to send financial transaction commands and authorizations in the belief that amid all the chaos the criminals would have, at the very least, a good head start. Of course it is also possible that there were perfectly legitimate reasons for the unusual rise in business volume. It could turn out that Americans went on an absolute shopping binge on that Tuesday morning. But at this point there are many transactions that cannot be accounted for. Not only the volume but the size of the transactions was far higher than usual for a day like that. There is a suspicion that these were possibly planned to take advantage of the chaos.”

It also quotes Richard Wagner, one of the companies data retrieval experts. “There is a suspicion that some people had advance knowledge of the approximate time of the plane crashes in order to move out amounts exceeding $100 million. They thought that the records of their transactions could not be traced after the mainframes were destroyed.”

Was the revolutionary electronic trading link between AIG and Marsh being used to funnel money through the World Trade Center at the time of the attack? Were the attack perpetrators hoping that the destruction of Marsh’s data center, on the 95th floor at the dead center of the North Tower explosion, would conceal their economic crime?

One piece of corroborating evidence for this idea comes from author and researcher Michael Ruppert, who reported in 2004 that immediately before the attacks began, computer systems in Deutsche Bank, one of SilverStream’s other e-link clients, had been taken over from an external location that no one in the office could identify.

MICHAEL RUPPERT: Within, I would guess — I’d have to go back and look at the book, but it was no more than a week of the attacks — I was being contacted by a lot of people, from inside official sources who were raising a lot of questions. This one particular person was extremely credible. They absolutely convinced me they had been an employee of Deutsche Bank in the Twin Towers, and they told me very clearly that in the moments right before the attacks and during the attack — there was a 40-minute window between the time the first plane struck the World Trade Center and the second plane — that Deutsche Bank’s computers in New York City had been “taken over.” Absolutely co-opted and run. There was a massive data purge, a massive data download, and all kinds of stuff was moving.

And what this person said very clearly was that no one in the Deutsche Bank offices in the towers at the time had the ability to prevent what was going on from any of their terminals.

(SOURCE: Terror Trading 9/11)

Sadly, no answer to the questions raised by these accounts is forthcoming from Convar. After the initial reporting on the investigation, which noted that the company was working with the FBI to recover and analyze the data, Convar now refuses to talk about the information they discovered.

DUTCH REPORTER: Is it true that large amounts of money were transferred illegally out of the World Trade Center on the morning of 9/11, just before the attacks?

CONVAR SPOKESMAN: If you would look on the website, I would say “Yes.”

DUTCH REPORTER: Uh huh.

CONVAR SPOKESMAN: Because that was the information from a previous release.

DUTCH REPORTER: Uh huh.

CONVAR SPOKESMAN: If you were to ask me today I would need to tell you I could not give you any additional information about that. I’m really sorry about…

DUTCH REPORTER: What if I were to ask you one year ago? What would you have…

CONVAR SPOKESMAN: I would have said that what we have there is what we said before. Yes, exactly.

(SOURCE: Dutch TV show Zembla investigates 9/11 theories)

At the time of 9/11, Marsh’s chief of risk management was Paul Bremer, the former managing director of Kissinger and Associates who went on to oversee the US occupation of Iraq. On the morning of 9/11 he was not in his office at Marsh & MacLennan, but at NBC’s TV studio, where he was delivering the official story of the attack.

NBC4 ANCHOR #1: Can you talk to us a little bit about…about…who could…I mean, there are a limited number of groups who could be responsible for something of this magnitude, correct?

PAUL BREMER: Yes, this is a very well-planned, very well-coordinated attack, which suggests it is very well-organized centrally, and there are only three or four candidates in the world really who could have conducted this attack.

NBC4 ANCHOR #2: Bin Laden comes to mind right away, Mr. Bremer.

PAUL BREMER: Indeed, he certainly does. Bin Laden was involved in the first attack on the World Trade Center which had as its intention doing exactly what happened here, which was to collapse both towers. He certainly has to be a prime suspect. But there are others in the Middle East, and there are at least two states, Iran and Iraq, which should at least remain on the list of potential suspects.

NBC4 ANCHOR #2: I don’t recall anything like this. Pearl Harbor happened a month before I was born and I hear my parents talk about that as a seminal event in their lives all the time. I’m not aware of anything like this in the United States before. Americans are now — I think it’s fair to say — really scared. Should we be?

NBC4 ANCHOR #1: This is a day that will change our lives, isn’t it?

PAUL BREMER: It is a day that will change our lives, and it’s a day when the war that the terrorists declared on the United States — and after all, they did declare a war on us — has been brought home to the United States in a much more dramatic way than we’ve seen before, so it will change our lives.

(SOURCE: Paul Bremer interview, NBC)

9/11 Insider Trading

On September 12, 2001, before the dust had even settled on Ground Zero, the Securities and Exchange Commission opened an investigation into a chilling proposition: that an unknown group of traders with advance knowledge of the 9/11 plot had made millions betting against the companies involved in the attacks.

ANTONIO MORA: “What many Wall Street analysts believe is that the terrorists made bets that a number of stocks would see their prices fall. They did so by buying what they call ‘puts.’ If you bet right the rewards can be huge. The risks are also huge unless you know something bad is going to happen to the company you’re betting against.

DYLAN RATIGAN: This could very well be insider trading at the worst, most horrific, most evil use you’ve ever seen in your entire life.

ANTONIO MORA: One example, United Airlines. The Thursday before the attack more than two thousand contracts betting that the stock would go down were purchased. Ninety times more in one day than in three weeks. When the markets reopened, United’s stock dropped, the price of the contracts soared, and someone may have made a lot of money, fast.

DYLAN RATIGAN: $180,000 turns into $2.4 million when that plane hits the World Trade Center.

ANTONIO MORA: It’s almost the same story with American Airlines.

DYLAN RATIGAN: That’s a fivefold increase in the value of what was a $337,000 trade on Monday (September 10, 2001).

ANTONIO MORA: All of a sudden becomes what?

DYLAN RATIGAN: $1.8 million.

ANTONIO MORA: And there’s much more, including an extraordinarily high number of bets against Morgan Stanley and Marsh & McLennan, two of the World Trade Center’s biggest tenants. Could this be a coincidence?

DYLAN RATIGAN: This would be one of the most extraordinary coincidences in the history of mankind if it was a coincidence.”

(SOURCE: 9/11 Wall Street Blames Put Option Inside Trading On Terrorists)

Although the put options on American and United Airlines are usually cited in reference to the 9/11 insider trading, these trades only represent a fraction of the suspicious trades leading up to the attack. Between August 20th and September 10th, abnormally large spikes in put option activity appeared in trades involving dozens of different companies whose stocks plunged after the attack, including Boeing, Merrill Lynch, J.P. Morgan, Citigroup, Bank of America, Morgan Stanley, Munich Re and the AXA Group.

Traders weren’t just betting against the companies whose stocks dove after 9/11, however. There was also a sixfold increase in call options on the stock of defense contractor Raytheon on the day before 9/11. The options allowed the traders to buy Raytheon stock at $25. Within a week of the attack, as the American military began deploying the Raytheon-supplied Tomahawk missiles they would eventually use in the invasion of Afghanistan, the company’s share price had shot up 37% to over $34.

The SEC weren’t the only ones interested in this particular 9/11 money trail, either. Investigations into potential insider trading before the attacks were opened by authorities around the globe, from Belgium to France to Germany to Switzerland to Japan. It wasn’t long before this global financial manhunt started yielding clues on the trail of the terror traders.

On September 17th, Italian Foreign Minister Antonio Martino, addressing Italian Consob’s own investigation into potential 9/11 trading, said: “I think that there are terrorist states and organizations behind speculation on the international markets.”

By September 24th, the Belgian Finance Minister, Didier Reynders, was confident enough to publicly announce Belgium’s “strong suspicions that British markets may have been used for transactions.”

The president of Germany’s central bank, Ernst Welteke, was the most adamant: “What we found makes us sure that people connected to the terrorists must have been trying to profit from this tragedy.”

These foreign leaders were not alone in their conviction that insider trading had taken place. University of Chicago finance professor George Constantinides, Columbia University law professor John Coffee, Duke University law professor James Cox and other academics as well as well-known options traders like Jon Najarian all expressed their belief that investors had traded on advance knowledge of the attacks.

The scale of the SEC investigation was unprecedented, examining over 9.5 million securities transactions, including stocks and options in 103 different companies trading in seven markets, 32 exchange-traded funds, and stock indices. The probe drew on the assistance of the legal and compliance staff of the 20 largest trading firms and the regulatory authorities in ten foreign governments. The Commission coordinated its investigation with the FBI, the Department of Justice, and the Department of the Treasury.

The result of this investigation?

“We have not developed any evidence suggesting that those who had advance knowledge of the September 11 attacks traded on the basis of that information.”

Although this sounds like the investigation did not find evidence of insider trading, a second look reveals the trick; they are not saying that there was no insider trading, only that there is no evidence that “those who had advance knowledge of the September 11 attacks” participated in such trading. But this begs the question: Who had that advance knowledge, and how did the SEC determine this?

The 9/11 Commission Report begs the question even more blatantly in their treatment of the anomalous put option activity on United Airlines stock on September 6: 95% of the puts were placed by “a single U.S.-based institutional investor with no conceivable ties to al Qaeda.” Again, it is taken as a foregone conclusion that a lack of ties to “al Qaeda” means there could not have been advance knowledge of the attack, even if the evidence shows insider trading took place.

To be sure, insider trading almost certainly did take place in the weeks before 9/11. Although some have used the Commission report to conclude that the story was debunked, the intervening years have seen the release of not one, not two, but three separate scientific papers concluding with high probability that the anomalous trading was the result of advance knowledge.

In “Unusual Option Market Activity and the Terrorist Attacks of September 11, 2001,” University of Chicago professor Allen Poteshman concluded: “Examination of the option trading leading up to September 11 reveals that there was an unusually high level of put buying. This finding is consistent with informed investors having traded options in advance of the attacks.”

In “Detecting Abnormal Trading Activities in Option Markets,” researchers at the University of Zurich used econometric methods to confirm unusual put option activity on the stocks of key airlines, banks and reinsurers in the weeks prior to 9/11.

And in “Was There Abnormal Trading in the S&P 500 Index Options Prior to the September 11 Attacks?” a team of researchers concluded that abnormal activity in the S&P index options market around the time of the attack “is consistent with insiders anticipating the 9-11 attacks.”

The only question, then, is who was profiting from these trades and why was no one ever indicted for their participation in them?

One lead is pursued by researcher and author Kevin Ryan. In “Evidence for Informed Trading on the Attacks of September 11,” he examines an FBI briefing document from 2003 that was declassified in 2009. It describes the results of FBI investigations into two of the pre-9/11 trades that the Bureau had identified as suspicious, including the purchase of 56,000 shares of Stratesec in the days prior to 9/11. Stratesec provided security systems to airports (including, ironically, Dulles Airport, as well as the World Trade Center and United Airlines) and saw its share price almost double when the markets re-opened on September 17th, 2001.

The trades traced back to a couple whose names are redacted from the memo, but are easily identifiable from the unredacted information: Mr. and Mrs. Wirt D. Walker III, a distant relative of the Bush family and business partner of Marvin Bush, the President’s brother. The document notes that the pair were never even interviewed as part of the investigation because it had “revealed no ties to terrorism or other negative information.”

In addition to begging the question, this characterization is provably false. As Ryan noted in a conversation with financial journalist Lars Schall:

KEVIN RYAN: “Wirt Dexter Walker at Stratesec hired several people from a company called The Carlyle Group, and The Carlyle Group had Bin-Laden family members as investors. Also Wirt Walker’s fellow (inaudible) director James Abrahamson was a close business associate of a man named Mansoor Ijaz, a Pakistani businessman and Mansoor Ijaz claimed to be able to contact Osama Bin-Laden on multiple occasions.

So there does seem to be some circumstantial evidence indicated that these people were connected to Al-Qaeda, at least to the point where we should investigate.

LARS SCHALL: And isn’t it also true that some members of the Bin-Laden family were actually in Washington at the gathering of The Carlyle Group on 9/11?

KEVIN RYAN: That’s true. The Carlyle Group had a meeting at the Ritz-Carlton Hotel in Washington on September 11th and present there were former President George H. W. Bush, James Baker and the brother of Osama Bin-Laden. I believe his name was Salem, I can’t recall his exact name. But they were there, investors from the Bin-Laden family meeting with Carlyle Group representatives in Washington on September 11th.”

(SOURCE: Terror Trading 9/11)

Was this why the FBI thought better of questioning him over his highly profitable purchase of Stratesec shares right before 9/11?

The CIA figures prominently in another line of investigation. One suspicious United Airlines put option purchase that was investigated by the FBI involved a 2,500-contract order for puts in the days before 9/11. Instead of processing the purchase through United Airlines’ home exchange, the Chicago Board of Options Exchange, the order was split into five 500-contract chunks and run through five different options exhchanges simultaneously. The unusual order was brokered by Deutsch Bank Alex. Brown, a firm that until 1998 was chaired by A.B. “Buzzy” Krongard, a former consultant to CIA director James Woolsey who at the time of 9/11 was himself the Executive Director of the CIA.

MICHAEL C. RUPPERT: So right after the attacks of 9/11 the name Buzzy Krongard surfaced, it was instant research that revealed that Buzzy Krongard had been allegedly recruited by CIA Director George Tennant to become the Executive Director at (the) CIA, which is the number three position, right before the attacks.

And Alex Brown was one of the many subsidiaries of Deutsche Bank, (which was) one of the primary vehicles or instruments that handled all of these criminal trades by people who obviously knew that the attacks were going to take place where, how and involving specific airlines.

(SOURCE: Terror Trading 9/11)

Perhaps the most frank admission of insider trading is notable for three things: It was recorded on video, it has never been investigated by any agency or law enforcement official, and it was made by former CIA agent and frequent foreign policy commentator Robert Baer, the real-life inspiration for the character portrayed by George Clooney in “Syriana.” Talking to citizen journalists after a speaking event in Los Angeles in 2008, Baer was recorded on video making a startling assertion about 9/11 insider trading:

JEREMY ROTHE-KUSHEL: …the last thing I want to leave you with is the National Reconnaissance Office was running a drill of a plane crashing into their building and you know they’re staffed by DoD and CIA…

ROBERT BAER: I know the guy that went into his broker in San Diego and said “Cash me out, it’s going down tomorrow.”

JEREMY ROTHE KUSHEL: Really?

ROBERT BAER: Yeah.

STEWART HOWE: That tells us something.

ROBERT BAER: What?

STEWART HOWE: That tells us something.

ROBERT BAER: Well, his brother worked at the White House.

(SOURCE: WeAreChangeLA debriefs CIA Case Officer Robert Baer about apparent Mossad and White House 9/11 foreknowledge)

This truly remarkable statement bears further scrutiny. If Baer is to be believed, a former CIA agent has first-hand knowledge that a White House insider had foreknowledge of the attacks, and to this day not only has Baer never revealed the identity of this person, but no one has questioned him about his statement or even attempted to pursue this lead.

So how is it possible that the SEC overlooked, ignored, or simply chose not to pursue such leads in their investigation? The only possible answer, of course, is that the investigation was deliberately steered away from such persons of interest and any connections that would lead back to foreknowledge by government agencies, federal agents, or their associates in the business world.

Unfortunately, we will likely never see documentary evidence of that from the Commission itself. One researcher requesting access under the Freedom of Information Act to the documentary evidence that the 9/11 Commission used to conclude there had been no insider trading received a response that stated “that the potentially responsive records have been destroyed.”

Instead, we are left with sources that refuse to be identified, saying that CBOE records of pre-9/11 options trading have been destroyed and [with] second-hand accounts of traders who had heard talk of an event in advance of 9/11.

In a round-about way, perhaps the 9/11 Commission reveals more than it lets on when it tries to dismiss key insider trades with the pithy observation that the traders had no conceivable ties to Al Qaeda. If those with foreknowledge of the attacks weren’t connected to Al Qaeda, what does that say about the identity of the real 9/11 perpetrators?

ANTONIO MORA: ABC News has now learned that the Chicago Board of Options Exchange launched their investigation into the unusual trading last week. That may have given them enough time to stop anyone from profiting from death here in the U.S. It may also give investigators, Peter, a “hot trail” that might lead them to the terrorists.

PETER JENNINGS: Thanks very much. As a reminder of the complications here, the Secretary of the Treasury said here today of this investigation, “You’ve got to go through ten veils before you can get to the real source.”

ANTONIO MORA: Yeah.

PETER JENNINGS: Thanks, Antonio.

(SOURCE: 9/11 Wall Street Blames Put Option Inside Trading On Terrorists)

PTech and Vulgar Betrayal

PTech was a Quincy, Mass.-based company specializing in “enterprise architecture software,” a type of powerful computer modeling program that allows large-scale organizations to map their systems and employees and to monitor them in real time. The person running this software has a “God’s-eye” view of processes, personnel and transactions, and even the ability to use this data to foresee problems before they happen and to intervene to stop them from happening.

As a senior consultant working on risk management for JPMorgan at the time of 9/11, Indira Singh was looking for exactly this type of software to implement the bank’s next-generation risk blueprint. In her search for the ultimate risk management software, PTech’s name was floated as the best candidate for the task.

INDIRA SINGH: I had a good life. I did “risk” at JP Morgan Chase, just to take a break from all the heavy stuff. What I’d do was to devise a way to monitor everything going on in a very large company to stop big problems from happening. There is that little cloud there and my very bizarre picture of how I think about this problem. I am a person who was merging two disciplines: Risk Management and something called “Enterprise Architecture” which is fairly esoteric but at the end of the day, we seek to prevent large problems from happening anywhere in a large global enterprise.

At JP Morgan I was working on the next generation “risk blueprint” which is all about how to prevent these things from happening. Bad business practice such as money laundering, rogue trading and massive computer failures, anything you could imagine (that) could go wrong.

I had a lot of leeway consulting as a “Senior Risk Architect” to think out of the box and actually get my ideas implemented. I was funded out of a strategic fund, I reported to the directors and I was pretty happy. JP Morgan thought very highly of me and they were thinking of funding, in conjunction with my project in D.C., the next-generation risk software.

What I need to do (and) what I did was (find) a really smart piece of software. Really, really smart. It’s job would be to think about all of the information and this is where you may connect a dot. The job of this software would be to think about all of the information that represented what was going on in the enterprise at any given time as bank business was being transacted world-wide. For example, it would (act) as a surveillance software that looked for trading patterns that indicated that someone was up too no good and then do something about it: send a message somewhere, send transaction information somewhere, perhaps shut their system down, perhaps shut another system down, perhaps start something else up elsewhere. This type of capability is very, very essential in today’s world.

However this kind of software is not found in Microsoft or not even in IBM. A small group of very esoteric software companies make this kind of enterprise software and it is very pricey. So you can’t afford to pick wrong and I asked all my colleagues who were industry gurus; what would they recommend for this?

My buddies recommended PTech.

(SOURCE: 9/11 Omission Hearings – Indira Singh Reads Sibel Edmonds’ Letter – 9/9/2004)

Indeed, it’s not difficult to see why PTech came so highly recommended. Given the nature of this sensitive risk-management work, only a company with experience delivering software to large-scale organizations with secrets to protect would fit the bill, and in this regard PTech did not disappoint. Their client roster included a veritable who’s who of top-level corporate and governmental clients: the FBI, the IRS, NATO, the Air Force, the Naval Air Command, the Departments of Energy and Education, the Postal Service, the US House of Representatives, the Department of Defense, the Secret Service, even the White House.

From the inner sanctum of the White House to the headquarters of the FBI, from the basement of the FAA to the boardroom of IBM, some of the best-secured organizations in the world running on some of the most-protected servers housing the most sensitive data welcomed PTech into their midst. PTech was given the keys to the cyber kingdom to build detailed pictures of these organizations, their weaknesses and vulnerabilities, and to show how these problems could be exploited by those of ill intent. But like all such systems, it could be exploited by those of ill intent for their own purposes, too.

Given the nature of the information and secrets being kept by its clients, it should come as no surprise that many of PTech’s top investors and employees were men with backgrounds that should have been raising red flags at all levels of the government. And as it turns out, at least one of these men did raise red flags with a pair of diligent FBI field agents.

In the late 1990s, Robert Wright and John Vincent—FBI special agents in the Chicago field office—were running an investigation into terrorist financing called Vulgar Betrayal. From the very start, the investigation was hampered by higher-ups; they were not even given access to the computer equipment needed to carry out their work. Through Wright and Vincent’s foresight and perseverance, however, the investigation managed to score some victories, including seizing $1.4 million in terrorist funds. According to Wright, “these funds were linked directly to Saudi businessman Yasin al-Qadi.”

Yasin al-Qadi is a multi-millionaire businessman and philanthropist who, according to business associates, liked to boast of his relationship with former Vice President Dick Cheney. But in the late 1990s he was sanctioned by the UN Security Council for his suspected links to Al Qaeda, and after 9/11 he was put on a terrorist watch list by the US Treasury for his suspected ties to terrorist financing.

During the 1990s, as Vulgar Betrayal was being thwarted from opening a criminal investigation into his activities, the Qadi-backed investment firm Sarmany Ltd. became an “angel investor” to a software startup called PTech, providing $5 million of the initial $20 million of capital that got PTech off the ground.

At the time, PTech’s CEO denied that al-Qadi had any involvement with the company other than his initial investment, but the FBI now maintains he was lying and that in fact al-Qadi continued investing millions of dollars in the company through various fronts and investment vehicles. Company insiders told FBI officials that they were flown to Saudi Arabia to meet PTech’s investors in 1999 and that al-Qadi was introduced as one of the owners. It has also been reported that Hussein Ibrahim, PTech’s chief scientist, was al-Qadi’s representative at PTech and al-Qadi’s lawyers have admitted that al-Qadi’s representative may have continued to sit on PTech’s board even after 9/11.

Ibrahim himself was a former president of BMI, a New Jersey-based real estate investment firm that was also one of the initial investors in PTech and provided financing for PTech’s founding loan. PTech leased office space and computer equipment from BMI and BMI shared office space in New Jersey with Kadi International, owned and operated by none other than Yassin al-Qadi. In 2003, counterterrorism czar Richard Clarke said: “BMI held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support.”

Suheil Laheir was PTech’s chief architect. When he wasn’t writing the software that would provide PTech with detailed operational blueprints of the most sensitive agencies in the U.S. government, he was writing articles in praise of Islamic holy war. He was also fond of quoting Abdullah Azzam, Osama Bin Laden’s mentor and the head of Maktab al-Khidamat, which was the precursor to Al-Qaeda.

That such an unlikely cast of characters were given access to some of the most sensitive agencies in the U.S. federal government is startling enough. That they were operating software that allowed them to map, analyze and access every process and operation within these agencies for the purpose of finding systemic weak points is equally startling. Most disturbing of all, though, is the connection between PTech and the very agencies that so remarkably “failed” in their duty to protect the American public on September 11, 2001.

BONNIE FAULKNER: Could you describe the relationship of PTech with the FAA? PTech worked with the FAA for several years, didn’t they?

INDIRA SINGH: Yes. It was a joint project between PTech and MITRE. It is interesting. They were looking at, basically, holes in the FAA’s interoperability with responding with other agencies—law enforcement—in the case of an emergency such as a hijacking.

They were looking for the escalation process—what people would do, how they would respond in case of an emergency—and find the holes and make recommendations to fix it. Now if anyone was in a position to understand where the holes were, PTech was, and that is exactly the point: if anybody was in a position to write software to take advantage of those holes, it would have been PTech.

BONNIE FAULKNER: Was there a reference to PTech having operated in the basement out of the FAA?

INDIRA SINGH: Yes. Typically, because the scope of such projects are so over-arching and wide-ranging, when you are doing an enterprise architecture project, you have access to how anything in the organization is being done, where it is being done, on what systems, what the information is. You have carte blanche.

If it is a major project that spends several years, the team that comes in has, literally, access to almost anything that they want because you are operating on a blueprint level, on a massive scale. So, yes, they were everywhere, and I was told that they were in places that required clearances. I was told that they had log-on access to FAA flight control computers. I was told that they had passwords to many computers that you may not, on the surface, think has anything to do with finding out holes in the system, but let’s say you isolated part of a notification process that was mediated by computer and you wanted to investigate it further, then you would typically get log-on access to that computer. From that, back upstream or downstream. So, who knows?

From my own experience I could have access to almost anything I wanted to in JP Morgan Chase. And did not, for the reason that if anything went wrong, I did not want to have the access. But if you were up to no good as an enterprise architect with such a mandate, you typically could have access to anything.

(SOURCE: Guns n Butter: Indira Singh, PTech and the 911 software)

So who was really behind PTech? Did Ziade, Ibrahim and the others somehow evade the due diligence of all of the government agencies and multinational corporations that PTech contracted with? Did PTech just happen to end up working on the interoperability of the FAA and the Pentagon systems on the morning of 9/11? Did al-Qadi’s friend Dick Cheney really know nothing of Qadi’s connections or activities? Was this all some devious Al Qaeda plot to infiltrate key systems and agencies of the US government?

Not according to the people who were really investigating the company.

INDIRA SINGH: Who’s really behind PTech is the question. Correct. I asked that of many intelligence people who came to my aid as I was being blacklisted and I was told: “Indira, it is a CIA clandestine operation on the level of Iran-Contra.” And I have reason to believe this because CARE International is a renamed version of Al Kifah, which was the finding arm for WTC 93, prior to Al Kifah it was called Maktab al-Khidamat which was the funding arms for the Afghani mujahidin. It was how the moneys got to Osama Bin-Laden through the Pakistani ISI.

I asked the FBI in Boston: ‘”How come Mak was being run out of Ptech and 9/11?” and that jived with a lot of what intel was telling me that “it’s a CIA front, shut up and go away.” At that level I said “Well why doesn’t the FBI take advantage of their celebrated difference with the CIA’ and I was told ‘because at that level they work together.”

(SOURCE: 9/11 Omission Hearings – Michael Ruppert & Indira Singh Q&A – 9/9/2004)

So what did the 9/11 Commission have to say about PTech? Absolutely nothing. The co-chair of the commission, Thomas Kean, had been involved in a $24 million real estate transaction with BMI, one of the PTech investors, but no mention was made of that at the time and the Commission never looked into PTech or its activities on 9/11.

Meanwhile, Cheney’s friend al-Qadi has since been removed from the Swiss, European, UN Security Council and US Treasury terrorist sanctions lists.

And Robert Wright? After Vulgar Betrayal was shut down, the FBI did eventually raid PTech’s offices in December 2002…but not before the company was given advance warning of the “raid.” The very next day then-Homeland Security chief Tom Ridge declared that PTech “in no way jeopardizes the security of the country.”

Oussama Ziade is still wanted by the FBI for lying about al-Qadi’s involvement with the company, but the case is now cold.

ROBERT WRIGHT: To the families and victims….of September 11th…on behalf of John Vincent, Barry Carnaby and myself…we’re sorry.

(SOURCE: 9-11 FBI Whistleblower Robert Wright Testimony)

The Pentagon’s Missing Trillions

DONALD RUMSFELD: The topic today is an adversary that poses a threat, a serious threat, to the security of the United States of America. This adversary is one of the world’s last bastions of central planning. It governs by dictating five-year plans. From a single capital, it attempts to impose its demands across time zones, continents, oceans and beyond. With brutal consistency, it stifles free thought and crushes new ideas. It disrupts the defense of the United States and places the lives of men and women in uniform at risk.

(SOURCE: Defense Business Practices)

On September 10, 2001, Defense Secretary Donald Rumsfeld declared a new war. Not a war on a shadowy terrorist organization in Afghanistan, or even a war on terror, but a war on the Pentagon itself.

DONALD RUMSFELD: The adversary is closer to home. It’s the Pentagon bureaucracy.

(SOURCE: Defense Business Practices)

Perhaps it is no surprise that Rumsfeld felt compelled to declare a war on the Pentagon’s bureaucracy. The issue of the Pentagon’s $2.3 trillion accounting nightmare had been dogging him since his confirmation hearings in January of 2001. Although Rumsfeld was interested in pushing forward a modernization of the military that was projected to cost an additional $50 billion in funding, that agenda was politically impossible in the face of the Department of Defense’s monumental budget problem.

SEN. BYRD: How can we seriously consider a $50 billion increase in the Defense Department budget when DoD’s own auditors—when DoD’s own auditors—say the department cannot account for $2.3 trillion in transactions in one year alone.

Now, my question to you is, Mr. Secretary, what do you plan to do about this?

DONALD RUMSFELD: Decline the nomination! (Laughs.) (Laughter.) Ah! Senator, I have heard —

SEN. BYRD: I don’t want to see you do that! (Laughter.)

SEN. LEVIN: (Sounds gavel.) We’ll stand adjourned, in that case! (Laughter.)

DONALD RUMSFELD: Senator, I have heard some of that and read some of that, that the department is not capable of auditing its books. It is — I was going to say “terrifying.”

(SOURCE: Defense Secretary Nomination Hearing Jan 11 2001)

“Terrifying” only begins to describe the problem.

The Department of Defense’s own Inspector General report for Fiscal Year 1999 noted that the Defense Finance and Accounting Service had processed $7.6 trillion of department-level accounting entries in that year. Of that amount, only $3.5 trillion could be properly accounted for. $2.3 trillion in transactions were fudged to make entries balance, run through without proper documentation, or made up entirely. The Inspector General’s office did not even examine the other $1.8 trillion in transactions because they “did not have adequate time or staff to review” them.

In 2002 one DFAS accountant blew the whistle on the problem and the cover-up that was underway to stop investigators from finding out where the money went.

VINCE GONZALES: $2.3 trillion with a “T.” That’s 8,000 dollars for every man, woman and child in America. To understand how the Pentagon can lose track of trillions, consider the case of one military accountant who tried to find out what happened to a mere $300 million.

JIM MINNERY: We know it’s gone, but we don’t know what they spent it on.

VINCE GONZALES: Jim Minnery, a former Marine turned whistleblower, is risking his job by speaking out for the first time about the millions he noticed were missing from one defense agency’s balance sheets. Minnery tried to follow the money trail, even crisscrossing the country looking for records.

JIM MINNERY: The director looked at me and said, “Why do you care about this stuff?” That took me aback, you know. My supervisor asked me why I care about doing a good job.

VINCE GONZALES: He was reassigned, and says officials then covered up the problem by just writing it off.

JIM MINNERY: They’ve got to cover it up.

(SOURCE: 9-11 Pentagon missing $2.3 trillion)

As Comptroller of the Pentagon from 2001 to 2004, Dov Zakheim was the man tasked with solving this problem.

DONALD RUMSFELD: There are all kinds of long-standing rules and regulations about what you can do and what you can’t do. I know Dr. Zakheim’s been trying to hire CPAs because the financial systems of the department are so snarled up that we can’t account for some $2.6 trillion in transactions that exist, if that’s believable. And yet we’re told that we can’t hire CPAs to help untangle it in many respects.

REP. LEWIS: Mr. Secretary, the first time and the last time that Dov Zackheim and I broke bread together, he told me he would have a handle on that 2.6 trillion by now. (Laughter.) But we’ll discuss that a little —

DONALD RUMSFELD: He’s got a handle; it’s just a little hot. (Laughter.)

(SOURCE: Testimony before the House Appropriations Committee: FY2002 Budget Request)

From 1987 to 2001, Zakheim headed SPC International, a subsidiary of System Planning Corporation, a defense contractor providing airwarfare, cybersecurity and advanced military electronics to the Department of Defense and DARPA. SPC’s “Radar Physics Laboratory” developed a remote control system for airborne vehicles that they were marketing to the Pentagon prior to 9/11.

Zakheim was also a participant in drafting “Rebuilding America’s Defenses,” a document that called for a sweeping transformation of the US military, including the implementation of the $50 billion missile defense program and increased use of specialized military technologies. The paper even noted how “advanced forms of biological warfare that can target specific genotypes may transform biological warfare from the realm of terror to a politically useful tool.”

“Rebuilding America’s Defenses” was a white paper produced by the Project for a New American Century, a group founded in 1997 with the goal of projecting American global dominance into the 21st century. Joining Zakheim in the group were a host of other neocons who ended up populating the Bush administration, including Dick Cheney, Paul Wolfowitz, Richard Perle, Jeb Bush, and Donald Rumsfeld. In their September 2000 document, the group lamented that their plan for transforming the military was not likely unless a defining event took place, one that would galvanize public opinion: “[T]he process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event—like a new Pearl Harbor.”

DONALD RUMSFELD: We know that the thing that tends to register on people is fear, and we know that that tends to happen after there’s a Pearl Harbor, tends to happen after there’s a crisis. And that’s too late for us. We’ve got to be smarter than that. We’ve got to be wiser than that. We have to be more forward-looking.

There’s a wonderful book on Pearl Harbor by Roberta Wohlstetter, and a forward by Dr. Schelling, that talks about this problem of seeing things happen and not integrating them in your mind and saying, “Yes, we need to be doing something about that now,” that I reread periodically because it’s so important.

(SOURCE: Defense Secretary Nomination Hearing Jan 11 2001)

And on 9/11/2001, America received its new Pearl Harbor.

The attack on the Pentagon struck Wedge One on the west side of the building. An office of the U.S. Army called Resource Services Washington had just moved back into Wedge One after renovations had taken place there. The office was staffed with 45 accountants, bookkeepers and budget analysts; 34 of them were killed in the attack.

2002 follow-up report from the DoD Inspector General on the missing trillions noted that a further $1.1 trillion in made up accounting entries were processed by the Pentagon in fiscal year 2000, but they did not even attempt to quantify the missing funds for 2001. The Secretary of the Army, Thomas White, later explained they were unable to produce a financial report for 2001 at all due to “the loss of financial-management personnel sustained during the Sept. 11 terrorist attack.”

Before becoming Secretary of the Army, Thomas White was a senior executive at Enron. Enron was one of the largest energy companies in the world, posting a $111 billion profit in 2000 before being exposed as an elaborate corporate accounting fraud in 2001. The SEC, which investigated the Enron scandal, occupied the 11th to 13th floors in World Trade Center Building 7, and their offices were destroyed on 9/11, destroying 3,000 to 4,000 documents on active investigations in the process.

Perhaps unsurprisingly, Rumsfeld’s War on the Pentagon’s Bureaucracy did not yield the results he promised. By 2013, the unaccountable money in the Pentagon’s coffers had reach $8.5 trillion.

REPORTER: The latest scandal to hit Washington comes from a report revealing the Pentagon “misplaced” $8.5 trillion. Military leaders have also been found ordering subordinates to doctor books to hide the missing money. This is the conclusion of a special report by Reuters.

One former Pentagon employee, Linda Woodford, said she spent 15 years there falsifying financial records. Woodford had a job checking Navy accounting records against figures supplied by the Treasury Department. She said money was missing from the report every month.

(SOURCE: $8.5 Trillion Missing From Pentagon Budget)

GAYANE CHICHAKYAN: National security expert Steve Miles is here with me to help us crunch these numbers. $8.5 trillion unaccounted for?

STEPHEN MILES: That’s a lot of money. This is the kind of thing that you would think would bring Capitol Hill to a screeching halt. There’d be hearings almost every day. You’d have various committees looking into it. None of that. It just leads to massive waste and there can be all sorts of fraud that you don’t know about.

Just one example, when the Inspector General looked at Iraq — which was a lot of money, but in the grand scheme just a portion of the money the U.S. spent — what they found was about $50 billion of the money the U.S. spent there was wasted and about $6 billion was completely lost. They had no idea where it went, it was completely unaccounted for. Put that in perspective. That’s about the amount of money that other countries would spend on their defense, total. And that’s just the loose pocket change that we lost in the couch.

GAYANE CHICHAKYAN: One thing I found very interesting in this report is that the Pentagon apparently uses standard operating procedure to enter false numbers, or so-called “plugs,” to cover lost or missing information in their accounting in order to submit a balanced budget to the Treasury. So they can write in everything.

STEPHEN MILES: This is probably the most shocking part of this. They get to the end of the day and they say, “Oh, there’s money missing, what do we do?” “Well, we’ll just put a number in there that says it’s there and we’ll sort it out later.” Again this is the type of operating practice that if you did it in your own business—if you try to do it with your own taxes for the government—they’d haul you off to jail.

(SOURCE: Black Budget: US govt clueless about missing Pentagon $trillions)

But then, given that the trillions have never been accounted for, and given that American defense spending soared to record levels after the attack, perhaps Rumsfeld’s war on the Pentagon, the one he announced on September 10th, was successful after all. And perhaps September 11th was the key battle in that war.

DONALD RUMSFELD: Some might ask, how in the world could the Secretary of Defense attack the Pentagon in front of its people? To them I reply, I have no desire to attack the Pentagon; I want to liberate it.

(SOURCE: Defense Business Practices)

No Conclusion

Insurance scams and insider trading, electronic fraud and Vulgar Betrayal, missing money and evidence destroyed. There are at least 8.5 trillion reasons to investigate the money trail of 9/11.

Curious, then, that the US government’s final word on the attacks, the 9/11 Commission Report, concluded that the money trail was not worthy of investigation at all. In Chapter Five of the report, the commission noted: “To date, the U.S. government has not been able to determine the origin of the money used for the 9/11 attacks. Ultimately the question is of little practical significance.”

9/11 was a crime. And as every detective knows, the first rule of criminal investigation is to follow the money. So why did the 9/11 Commission specifically reject this rule?

The answers to 9/11 are not going to come from the suspects of the crime. Instead, it’s up to investigators to continue to unearth the true evidence on the 9/11 money trail.

Follow the money…

October 24, 2018 Posted by | Deception, False Flag Terrorism, Timeless or most popular, Video | , | 1 Comment

Appeals Court: Police can violate our rights without fear of being sued

MassPrivateI | October 23, 2018

For those of you that claim we don’t live in a police state, I give you this recent Michigan Appeals Court ruling.

In 2015, Deputy James Dawson went to Joshua Brennan’s home and knocked on his door trying to obtain a breath sample. When Brennan did not answer, Dawson spent an hour and a half knocking at his doors and windows.

Officer Dawson also put crime-scene tape over Brennan’s security cameras to conceal his actions and used his siren and cruiser lights in an attempt to rouse him.

When Brennan finally opened his door, officer Dawson forced him to take a breathalyzer and arrested him for a probation violation even though he blew a 0.000.

All of this was done without a warrant. (Warrantless breathalyzer tests was not a condition of Brennan’s probation.)

If you think, it is obvious to any reasonable person that his rights were violated. Then you don’t know how the Sixth Circuit Court of Appeals interprets the Constitution.

The fact that this even went to an Appeals Court, speaks volumes about our justice system but I digress.

Let’s get back to the ruling;  judge John Nalabandian said that officer Dawson did violate Brennan’s Fourth Amendment rights by searching him without a warrant. All is good so far, right?

Not quite, Nalabandian went on to say “police actions that violate the Constitution do not lead to liability.”

The court also ruled that since officer “Dawson’s implied license was not clearly established” and because of that old police standby, “deficient training” he cannot be sued.

To say that the court’s reasoning is frustrating is an understatement. The court said that because “Wilson and Clare County were not on actual or constructive notice that the deputy training was deficient they could not be liable.”

Does anyone really think police are held to a higher standard when they constantly use the “deficient training” excuse?

If you are upset by the court’s ruling that police are not liable for violating the Constitution I warn you – it only gets worse.

Citizens must prove to judges that violating out rights is unlawful

According to the Sixth Circuit and this speaks volumes about our justice system “the plaintiff bears the burden of proving that the right was so well settled that every reasonable official would understand that what he is doing is unlawful.”

In other words, citizens must prove to a “reasonable official” [judge] that a police officer violating the Constitution is unlawful.

The Sixth Circuit claimed that since the Hardesty v. Hamburg Twp. ruling did not set a limit on how long a police officer can harass people at their homes Brennan cannot sue the police.  Even though they admitted that “absent a warrant a police officer has no greater license to remain on the property than a Girl Scout or trick-or-treater.”

The ruling repeatedly admits that “Dawson arguably violated the Constitution.” but states for a second time that “even if a government official violated a constitutional right, that official is entitled to qualified immunity.”

The Sixth Circuit refused to view the “constitutionality of the officer’s conduct or the continuing viability of Hardest and Turk.”

Not only did the Appeals court rule that Brennan cannot sue the police for violating his rights but they dismissed his unlawful arrest claim as well.

Only one judge, Karen Moore dissented and agreed like any “reasonable official” should, saying Brennan’s rights were violated and the officer could be sued.

Why is the media silent when rulings as egregious as this are taking place across the country?

Proving to “reasonable officials” that violating our rights is unlawful? America is fast on its way to becoming a police state.

October 24, 2018 Posted by | Civil Liberties | , | 4 Comments

Israeli forces assault priests, detain one in Jerusalem

The arrest of Monk Macarius Orshalemy. © Coptic Orthodox Patriarchate Jerusalem
Ma’an – October 24, 2018

JERUSALEM – Israeli forces and police assaulted several Coptic Orthodox priests in front of the Church of the Holy Sepulchre, in the Old City of occupied East Jerusalem, and forcefully detained one of them on Wednesday morning.

Prior to the assault, the Coptic Orthodox Church organized a peaceful protest near Deir al-Sultan Monastery, located on the roof of the Church of the Holy Sepulchre, against an Israeli decision denying the church the right to conduct the needed renovation work inside the holy site.

It is noteworthy that the Israeli municipality of Jerusalem continues to conduct unauthorized renovation work for the Ethiopian Coptic Church section without the approval of the Coptic Orthodox Church.

Eyewitnesses said that Israeli soldiers and police officers surrounded the priests who were protesting, before assaulting and pushing them with excessive use of force, causing them several injuries.

Witnesses added that the Israeli police forcibly removed the priests and detained one of them, before allowing the Israeli municipality workers into the holy site.

The Islamic Christian Committee to Defend Jerusalem and Holy Sites condemned the assault on the Coptic Orthodox priests and denounced the intervention of Israeli authorities in the renovation works of the holy site.

The committee pointed out that it is not within its jurisdiction to intervene in issues of occupied East Jerusalem, considering the area is subjected to the rules of international humanitarian law (IHL).

The committee called upon the Egyptian government and the Christian world to immediately intervene to stop Israeli authorities from these attacks and not to enter the holy site under the pretext of restoration, since the Coptic Orthodox Church is the only authorized body to do so.

The committee also called on the world to stand by the Palestinian right to sovereignty over its land in the holy city and the rest of its other occupied territories, and to stop the measures carried out by the Israeli occupation in violation of the resolutions of international law and international humanitarian law.

October 24, 2018 Posted by | Ethnic Cleansing, Racism, Zionism, Illegal Occupation, Video | , , | 2 Comments

Syria Update: Creeping Partition

By Peter Ford | October 23, 2018

The September crisis over Idlib was brought to a conclusion by the Russian Turkish agreement to create a partially demilitarised border strip. This should have been implemented by 16 October but hasn’t.

Idlib

Some armed groups have pulled back their heavy weapons from the 15-20 km wide 250 km long strip but others haven’t, while the groups internationally categorised as terrorist, including Hayat Tahrir Ash Sham (HTS), Hurras Ad Deen, and the Turkmenistan militia, have not vacated the area as the Turks promised. Russia was supposed to be allowed into the area to monitor but isn’t. In blatant violation of the ceasefire some of the groups are shelling neighbouring government-controlled areas including the outskirts of Aleppo and northern Lattakia.

The Turks claim all is well. The Russians, putting a brave face on a very unsatisfactory situation, call for patience. The reality appears to be that the Russians don’t think the Syrian government forces are strong enough to overcome the approximately 90,000 jihadi fighters in Idlib, many dug in in areas of difficult terrain, and all promised air cover by the US if Asad advances.

It has barely been noticed that the US has moved the goalposts on what it gives itself permission to do in Syria. The new US envoy for Syria, James Jeffrey, a former diplomat emerging from that neocon haven, the Washington Institute for the Near East Policy, stated explicitly recently that the US no longer felt itself bound to bomb Syria only if Asad used chemical weapons: henceforth the US would bomb ‘if Asad advances. Period’. (In such an eventuality it would be interesting to see how the British government went about following suit, although it is worth noting that its much contested legal opinion which was offered in April (attached) would startlingly licence the government to bomb under any circumstances whatever as long as it claimed to be acting for humanitarian reasons.)

Some claim that the standoff and emergence of an effectively separate entity in the North could force the Syrian government to make concessions at the negotiating table. This is wishful thinking. The Syrian government would never regard recovery of a lost province as a fair price for surrendering power. That being the case what we are witnessing appears to be the beginning of the emergence of a safe haven for terrorists under the guardianship of the Turks and the air umbrella of the Western powers: a replay of US/Saudi support for the Taliban in the days when removing the Russians from Afghanistan seemed like a good idea.

The North East

The dismemberment of Syria continues also in the North East (Al Hasakeh province and part of Deir Ez Zor province) which is under the joint control of the Kurdish-dominated SDF (Syrian Democratic Forces) and the US. Here too the US recently moved the goalposts virtually unnoticed, Secretary of Defence Mattis declaring that the purpose of the US forces’ presence was to combat Iran, which has no presence whatever in the North East. The US barely even pretends now that the purpose is to defeat the lingering remnants of ISIS, a task which the Syrian forces could handle easily if they were allowed to enter the parts of Deir Ez Zor and Hasakeh provinces where ISIS lurks effectively under US protection. The US plan appears to be to condition the withdrawal of the US presence on the withdrawal of that of the limited number of Iranian military advisers in Syria and of the rather larger number of Iranian–funded militia forces, considered essential to its security by the Syrian government. As many have pointed out this is a recipe for another open-ended US commitment to a military presence in the Middle East.

When the US-led coalition does move against ISIS remnants it is careless of civilian casualties: 62 civilians were killed this week in an air strike on two villages in Deir Ez Zor. This being the conveniently anonymous ‘coalition’ we have no way of knowing if the RAF was involved.

Hopes had been aroused that the US might pull out because of the costliness of propping up local civilian services, which for Trump is anathema. The arrival of 100 million dollars from Saudi Arabia in the Pentagon’s bank account last week (totally unconnected of course with the current predicament of Crown Prince Mohamed Bin Salman) may have upset the Turks, unhappy to see another Kurdish statelet emerging, but it has eased the financial burden of de facto US occupation.

Al Tanf

The US had given some hints that it might be willing to draw back from the Al Tanf enclave it controls with UK military support near the apex of the Syrian, Jordanian and Iraqi borders. Displaced persons started to go home from the jihadi-infested Rukban camp which lies within the Al Tanf perimeter. The Syrian government is offering to facilitate more returns but will not acquiesce in US control over sovereign Syrian territory. Hopes of US departure appear to have been dashed, however, as it becomes clearer that the new US strategy for Syria requires the US to keep all its assets in Syria, however vulnerable they would be in the event of major conflict, and however much they complicate the humanitarian situation, as potential bargaining chips to force the Syrian government to make concessions in terms of relinquishing Iranian military protection, preparatory to a reinvigorated Geneva negotiating process with a weakened Asad which would deliver the yearned for ‘transition’ away from him.

Return of refugees and reconstruction

With most territory clawed back and fighting now virtually on pause, the Syrian government is working hard to resettle the internally displaced and encourage the return of refugees. Syria’s enemies have discouraged return but many Syrians have voted with their feet: 50,000 have already returned from Lebanon in 2018. Much has been made by those enemies of Law 10 which required property owners to register their claims, an essential step before large scale reconstruction of heavily damaged districts could proceed and new housing be allocated. This was disingenuously portrayed as a land grab by the government. Reports suggest that registration has been put on hold.

Funds for reconstruction remain elusive. The Western powers continue to block any international development assistance as long as the holy grail of ‘transition’ has not been attained.

Meanwhile ordinary Syrians continue to groan under the handicaps of sanctions and government red tape.

Israel

Israel’s mis-step in causing the shooting down of a Russian plane has been heavily punished. Syria has now taken delivery of several Russian S-300 anti-aircraft systems, as well as aircraft communication jamming equipment. As a result Israel, which carried out over 200 air raids on Syria before the incident, has not carried out a single one since, possibly pending delivery by the US of more stealth fighter bombers. The US has categorised Russia’s delivery of the new (defensive) systems as ‘destabilising’ ….

Farewell Staffan de Mistura

The UN envoy for Syria, Staffan de Mistura, has announced his intention to step down in November, citing ‘personal reasons’. His great achievement in the eyes of Western powers was to keep the Geneva process alive when it was clearly moribund. Without Geneva they would lose the commitment to ‘transition’ which Russia conceded in a moment of great weakness in 2014. The Geneva process has been void of significance, however, for years. The besuited opposition representatives who attend the Geneva discussions are transparently stooges of the Western and Gulf powers and have absolutely no influence over the Islamist battalions, who have not the slightest interest in the refining of the constitution or sharing power and who listen only to Turkey, which controls their logistics. The only meaningful negotiation takes place between Turkey and Russia.

White Helmets

The government declined to answer Baroness Cox’s parliamentary question as to their plans for receiving White Helmets who fled Syria via Israel in July, citing the protection needs of this particularly ‘vulnerable’ category of refugee, only to leak details via the Daily Telegraph a few days later. It transpires that the country can look forward to receiving 28 of these ‘heroes’ with their families. Meanwhile a White Helmets local leader who remained behind, giving the lie to those who claimed they would all be rounded up, told a Western journalist that half of the evacuees were not White Helmets at all but jihadis masquerading as such.

Peter Ford was a British Ambassador to Syria; he is now an important, independent commentator on the dirty war.

October 24, 2018 Posted by | Illegal Occupation | , , , , | 1 Comment

The US Is Linking Hezbollah With The Cartels To Advance The Anti-Iranian Infowar

By Andrew KORYBKO – Oriental Review – 24/10/2018

US Attorney General Jeff Sessions created an elite task force for specifically investigating Mexican drug cartel and Hezbollah activity in America.

His move comes just weeks before the upcoming midterms in early November and represents Trump following through on his campaign promise to investigate these groups, with the differentiating factor being that the US also regards Hezbollah as a “terrorist organization” despite Russia and many other countries not sharing this position. Another point is that the current administration is basically equating this Mideast-based socio-political movement with MS-13 and other infamous drug trafficking gangs, which could hint at its intentions in laying the basis for the forthcoming infowar narrative that it might supposedly represent an Iranian-backed “Hybrid War threat” to the American Heartland. The buildup to this state-backed storyline perfectly coincides with the impending re-imposition of US sanctions against Iran, too.

Furthermore, it was revealed late last year that the Obama Administration suppressed what has been referred to as “Operation Cassandra”, which was allegedly a wide-ranging investigation into Hezbollah’s activities across the entire Western Hemisphere and specifically inside the US itself. Whether the accusations from that time about the group’s involvement in organized crime are true or not, the important point is that the Trump Administration appears to believe them or at the very least wants to procure more public evidence – whether real or fabricated – of this. Successfully doing so could enable the President to “defend” his destabilizing actions against Iran with the specious excuse that Iran is also “meddling” in American affairs too and has supposedly been since even before his inauguration.

Moving beyond the rhetoric and into the realm of practical policy application, Sessions’ crusade against the cartels and Hezbollah is designed to advance the administration’s law-and-order agenda, which would be a great thing for average Americans if it does indeed end up putting dangerous criminals behind bars regardless of whoever they might be. That’s not to say that Hezbollah in and of itself should objectively be considered a criminal entity, nor that there aren’t powerful arguments in favor of its existence and the causes that it supports, but just that its members need to obey the same laws that everyone else has to follow and shouldn’t harm innocent Americans through the financial, drug, violent, and other crimes that they might be engaged in to fund their organization.

Having said that, Sessions clearly has political motives for singling out Hezbollah from the US’ many other and much more influential suspected criminal organizations and lumping it together with well-known and infamous ones such as MS-13 in the context of his newly created taskforce. One of the main reasons for doing this appears to be the government’s plan to popularize the notion that Hezbollah is equivalent to the cartels prior to using this narrative as joint “justification” for more openly meddling in Iran’s domestic affairs and taking an even stricter approach towards the group’s activities in the Mideast. These probable forthcoming policy moves perfectly align with the interests of Israel, which believes that it’s existentially threatened by both Iran and its Hezbollah partners.

This means that Sessions’ taskforce is intended to advance Israel’s interests just as much as America’s, and it’s likely that they’ll work hand-in-hand in the course of these newly announced investigations.

The post presented is the partial transcript of the CONTEXT COUNTDOWN radio program on Sputnik News, aired on Friday Oct 19, 2018.

October 24, 2018 Posted by | Deception, Timeless or most popular, Wars for Israel | , , , , , , | Leave a comment

1983 US Barracks Bombing in Beirut: Will Iran Ever Get Its Frozen Billions Back?

Sputnik – 24.10.2018

Tuesday marked the 35th anniversary of the October 23, 1983 terrorist truck bombings of buildings containing US and French forces in Beirut, Lebanon. In the attacks’ aftermath, Washington accused Tehran of involvement, froze nearly $2 billion in Iranian assets, and decided to seize and appropriate these funds in 2016.

As a result of the barracks blast, 241 US Marines and 58 French paratroopers were killed, along with 6 Lebanese civilians. A group called Islamic Jihad Organization claimed responsibility for the blast, but Israeli and US officials have claimed Iranian involvement.

In 2016, the US Supreme Court ordered Iranian assets frozen in US banks to be paid out to the families of the US servicemen killed in the blast. Iran decried the decision, calling it “theft,” and took its case to the International Court of Justice. Earlier this month, US lawyers urged the ICJ to dismiss the Iranian suit, arguing that its appeal was “legally flawed.”

Speaking to Sputnik Persian about the anniversary of the blast, and US authorities’ decision to seize and appropriate Iranian assets, Dr. Seyed Hadi Afgahi, renowned expert on Middle East affairs and former diplomat at Iran’s embassy in Lebanon, said Tehran was unlikely to get its money back.

Commenting on the US claims against Iran, Afgahi said that the Beirut bombing was not the first time that the US has baselessly accused Iran of carrying out actions directed against US interests, citizens, military and diplomatic personnel, and certainly wouldn’t be the last.

“The US is filing lawsuits against Iran, but is forming these courts themselves, and making the rulings themselves. Where else in the world can one see a situation where the investigation is carried out by the same people who file the lawsuit, and the ruling is made by the same people, as well?” the observer asked, pointed to the multiple suits filed in US courts over the years accusing Iran of involvement in various terror acts.

“Recently, for example, the International Court of Justice ruled in Iran’s favor and demanded that the US lift some of its sanctions against Iran. The response from the US was that this decision means nothing to them. This is Washington’s logic at its core – the logic of unilateral claims,” Afgahi added.

As far as the Beirut bombings case is concerned, the former diplomat suggested that whatever Tehran does in international courts, it can’t force Washington to adhere to the courts’ decisions. “The International Court of Justice in the Hague is an organ controlled by the UN, but the US simply refuses to comply with its decisions,” he lamented.

Regarding the real perpetrators standing behind the 1983 blast, Afgahi said that it’s necessary to take a broader view, accounting for US actions, and not just those of the terrorists. “The Americans were the ones who attacked the people of Lebanon, killed them, bombed them, with their ships regularly bombing Beirut’s coast. They placed a base in the city, seizing buildings, landing their forces without the permission of the Lebanese authorities,” the observer recalled. “This is the same thing that they’re doing today – invading, killing and bombing,” he argued.

Ultimately, Afgahi believes that in the present circumstances, Iran will be unlikely to achieve justice and the return of its assets, particularly after the unilateral US withdrawal from the Joint Comprehensive Plan of Action nuclear deal and the introduction of new, aggressive sanctions against Tehran.

October 24, 2018 Posted by | Illegal Occupation, Timeless or most popular, Wars for Israel | , , , | 3 Comments

DNC Emails–A Seth Attack Not a Russian Hack

Publius Tacitus | October 23, 2018

If Russia had actually “hacked” the DNC emails then the National Security Agency would have had proof of such activity. In fact, the NSA could have tracked such activity. But they did not do that. That lack of evidence did not prevent a coordinated media campaign from spinning up to pin the blame on Russia for the “theft” and to portray Donald Trump as Putin’s lackey and beneficiary.

Any effort to tell an alternative story has met with stout opposition. Fox News, for example, came under withering fire after it published an article in May 2017 claiming that Seth Rich, a young Democrat operative, had leaked DNC emails to Julian Assange at Wikileaks. The family of Seth Rich reacted with fury and sued Fox, Malia Zimmerman and Ed Butowsky, but that suit subsequently was dismissed.

Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange. While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich “dropped boxed” the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC.

If Seth Rich was just a normal kid in the wrong place at the wrong time, his murder and untimely death would only have been a minor blip in the news cycle. Blip or not, it was a terrible loss for his family and friends. But Seth was not an ordinary kid. He worked for the Democratic National Committee aka the DNC and described himself as an “experienced and impassioned data analyst” keen on making the world a better place.Rich met a sudden and brutal end in a neighborhood near the U.S. Capitol in Washingtion, DC in the early hours of July 10, 2016. The initial report about the murder did not raise any political antanae in the United States. The CNN reporting of the murder was representative of the coverage at the time:

A Democratic National Committee employee died this weekend after he was shot in Northwest Washington.

Seth Rich, 27, suffered multiple gunshot wounds early Sunday morning in Washington’s Bloomingdale neighborhood, according to law enforcement officials.

D.C. police said officers who had been patrolling the area responded to the sound of shots fired, ultimately finding Rich at the scene both “conscious and breathing.” He was then transported to an area hospital, where police said he “succumbed to his injuries and was pronounced dead.”

Rich worked as voter expansion data director for the DNC since 2014, the DNC confirmed. A 2011 graduate of Creighton University, Rich’s resume is filled with various jobs in Democratic politics and political consulting.

But the circumstances and facts surrounding the murder were strange. Seth was shot in the back. Nothing was taken from his body—not his watch, not his wallet and not his credit cards. There was no obvious answer to the questions—who shot Seth and why?

The interest in Seth’s death took a dramatic turn when Wikileaks dumped the contents of DNC emails on its website on July 22, 2016. In order to put the Wikileaks theory regarding Seth’s death in proper perspective, we must review events in the prior months connected to the Hillary Clinton and DNC email controversies.

Seth Rich will go down in history, fairly or unfairly, linked to the debate surrounding Hillary Clinton’s missing and/or classified emails. During her time as Secretary of State, Hillary used a private server and sent thousands of messages over that server. This included emails containing Top Secret material.

In May 2016, the State Department Inspector General added further fuel to the controversy by concluding that Hillary had violated State Department protocols and policies:

The Inspector General was unable to find evidence that Clinton had ever sought approval from the State Department staff for her use of a private email server, determining that if Clinton had sought approval, Department staff would have declined her setup because of the “security risks in doing so.”[54] Aside from security risks, the report stated that “she did not comply with the Department’s policies that were implemented in accordance with the Federal Records Act.”[57]

Public interest in Hillary’s emails grew on June 12, 2016 when Wikileaks founder, Julian Assange, stated during an ITV interview that his outfit had more Hillary emails:

“We have upcoming leaks in relation to Hillary Clinton … We have emails pending publication, that is correct,” Assange said.

Two days later (June 14) came news that the DNC computers had been “hacked” by the Russians. Ellen Nakamura, a Washington Post reporter who had been briefed by a computer security company hired by the DNC—Crowdstrike–, wrote:

Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.

The intruders so thoroughly compromised the DNC’s system that they also were able to read all email and chat traffic, said DNC officials and the security experts.

The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.

The Nakamura piece marked the first salvo in the Russian hacking meme. But the claim was not backed up by independently verified forensic evidence—it rested solely on the conclusions of a computer security company—Crowdstrike. The pro-Ukrainian politics of Crowdstrike’s founder, Dmitri Alperovitch, and his strident opposition to Russia cast a pall of bias over the findings of Crowdstrike. No U.S. Federal Law Enforcement official or agency was given access to the DNC servers. Neither the FBI nor Homeland Security were permitted to examine the servers and the alleged evidence of a hack.

Crowdstrike revealed that not one but two groups of hackers believed to be based in Russia had done just that. The intruders, according to Crowdstrike and the DNC officials who spoke to the Washington Post, fully accessed the campaign organization’s emails and chats, and stole opposition research on Republican presidential front-runner Donald Trump. . . .

In a blog post detailing the attack, Crowdstrike pointed to two groups of known Russian government-aligned hackers, one dubbed Cozy Bear and another called Fancy Bear. According to Crowdstrike, the two teams seemingly worked independently, either unaware of each others’ existence or even vying for dominance within the strange, internally competitive intelligence apparatus of Vladimir Putin’s regime.

The most bizarre aspect of Crowdstrike’s claim is that it started its “investigation” of the so-called hacking on the 7thof May and supposedly immediately discovered it was “the Russians.” Yet Crowdstrike waited more than a month to do what should have been done on 7 May—shutdown the network. Vicky Ward reported in Esquire on 24 October 2016 that Crowdstrike waited until June 10 to take steps to protect the DNC network:

Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office.

For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.

This was a classic case of closing the barn door after the horse had escaped. Crowdstrike started work in early May 2016 but failed to prevent the DNC emails from making their way to Wikileaks. The DNC emails that were released on July 22, 2016 by Wikileaks covered the period from January 2015 thru 25 May 2016. Crowdstrike started work on 7 May at the DNC. If this was truly a hack from an outside computer network then it should have been impossible for any outsider to electronically hack the DNC network. But the information on the DNC network was taken around the close of business on the 25thof May.

The day after Ellen Nakamura reported that the Russians had hacked the DNC, Guccifer 2.0 surfaced and took credit for the hack. Guccifer 2.0 made a point of specifically denying that he was Russian in an interview with Motherboard:

“I don’t like Russians and their foreign policy. I hate being attributed to Russia,” he said, adding that he was from Romania, just like the first Guccifer.

Guccifer 2.0 said he hacked into the DNC in the summer of 2015. He claimed that he used an unknown vulnerability in NGP VAN, which is a software provider for the DNC, to hack into the DNC servers, which have a Windows architecture. (There’s no evidence whatsoever that the hacker really broke through via NGP VAN.)

“Then I installed my Trojans on several PCs. I had to go from one PC to another every week so CrowdStrike couldn’t catch me for a long time,” he said. “I know that they have cool intrusion detection system. But my heuristic algorithms are better.”

Guccifer’s claim to be something other than Russian immediately was derided by those invested in the blame Russia meme. Motherboard, for example, published a piece on June 16 labeling Guccifer 2.0 as a Russian front, but that conclusion was based solely on circumstantial, stylistic evidence:

. . . considering a long trail of breadcrumbs pointing back to Russia left by the hacker, as well as other circumstantial evidence, it appears more likely that Guccifer 2.0 is nothing but a disinformation or deception campaign by Russian state-sponsored hackers to cover up their own hack—and a hasty and sloppy one at that.

Guccifer 2.0 surfaced again the end of June with more documents:

On June 30, Guccifer 2.0 posted additional documents from the Democratic National Committee’s servers on the WordPress blog. The post again denied Russian links, and spoke admiringly of Julian Assange, the founder of WikiLeaks; Edward J. Snowden, the former intelligence analyst who leaked archives of surveillance documents; and Chelsea Manning, the Army private who sent a huge trove of military and diplomatic documents to WikiLeaks in 2010.

Guccifer 2.0 faded into the woodwork when Wikileaks released the DNC emails on the 22 of July. Although Wikileaks protected the source of the DNC material, Julian Assange insisted that Russia had anything to do with putting the DNC trove into his hands.

Following the Wikileaks dump, Donald Trump made news on the campaign trail by sarcastically calling on the Russians to provided Hillary’s missing 30,000 emails:

“Russia, if you’re listening, I hope you’ll be able to find the 30,000 emails that are missing,” he said, referring to deleted emails from the private account Hillary Clinton used as secretary of State. “I think you’ll probably be rewarded mightily by our press.”. . .

“If Russia or China or any other country has those emails, I’ve got to be honest with you. I’d love to see them,” he said later, declining to back down.

Experts suspect that Russian agents  are behind the hack and release of Democratic officials’ emails last week that showed officials discussing ways to undermine Bernie Sanders’ primary campaign against Clinton.

Trump often has praised Putin and has claimed to have met him, but on Wednesday, he denied that they have met. He also denied multiple media reports that he is in debt to Russian lenders.

Trump clearly was joking. He was riffing on the fact that the DNC emails had been published on Wikileaks and that Russia was being blamed. But the Democrats, never known for their keen sense of humor, seized on this moment as an opportunity to introduce the meme that Trump and Russia were collaborating to stop Hillary’s quest for the Presidency. The Hillary team understood the fundamentals of good drama–i.e., a solid story needs a good villain. Donald and Vladimir Putin became the villains of this tale:

Hillary Clinton . . . accused Russian intelligence services of hacking into the Democratic National Committee computers and she said her Republican rival Donald Trump has shown support for Russian president Vladimir Putin.

“We know that Russian intelligence services hacked into the DNC and we know that they arranged for a lot of those emails to be released and we know that Donald Trump has shown a very troubling willingness to back up Putin, to support Putin,” Ms Clinton said in an interview with Fox News, as reported by Reuters.

US officials and cyber security experts have previously said they believed Russia had something to do with the release of the emails in order to influence the election.

In reviewing the media coverage of the DNC “hack” during June and July the name of Seth Rich does not surface even as a minor concern. This all changed on August 9, 2016 when Wikileak’s Julian Assange announced via Twitter “a $20,000 reward for information leading to a conviction in Rich’s killing on July 10 in the 2100 block of Flagler Place NW.” Assange subsequently discussed the murder of Seth Rich during an interview with Dutch TV:

WikiLeaks editor Julian Assange suggested that the Democratic National Committee staffer shot dead last month in Washington, DC, was killed because he was a “source.”

“Whistleblowers go to significant efforts to get us material and often very significant risks. As a 27-year-old, works for the DNC, was shot in the back, murdered just a few weeks ago for unknown reasons as he was walking down the street in Washington,” he told Dutch TV, referring to Seth Rich, who was gunned down in the early morning hours of July 10 while walking to his apartment in Bloomingdale.

The interviewer followed up by asking, “That was just a robbery, I believe. Wasn’t it?”

The WikiLeaks founder cryptically replied, “No, there’s no finding … I’m suggesting that our sources take risks.”

Rather than address the substance and facts of what Wikileaks and Assange were saying and doing with respect to Seth Rich, most of the media concentrated on dismissing the Seth Rich story as a crazed conspiracy theory.

The only media outlet that tried to tell this story–Fox News–soon found itself in a media and legal maelstrom. Fox released a well-sourced article in May 2017. Written by Malia Zimmerman, the article reported that Seth had downloaded the Wikileaks documents, uploaded them to a DropBox account and passed them on to Julian Assange. Malia wrote:

The Democratic National Committee staffer who was gunned down on July 10 on a Washington, D.C., street last July just steps from his home in the cozy Washington DC’s Columbia Heights neighborhood, leaked thousands of highly controversial emails to WikiLeaks that were generated internally between DNC party leaders, Fox News has confirmed after a 10-month investigation.

A federal investigator who reviewed an FBI forensic report detailing the contents of DNC staffer Seth Rich’s computer generated within 96 hours after his murder, said Rich made contact with Wikileaks through Gavin MacFayden, a famous American investigative reporter and director of Wikileaks.

“I have seen and read the emails between Seth Rich and Wikileaks,” the federal investigator told Fox News, confirming the MacFayden connection. But he said the whole case was put to rest after the FBI initial audit, and agents were told not to investigate further. The emails sit inside the FBI today, said the federal agent, who asked to remain a confidential source.

The Fox News piece was solid and well sourced. In addition to the Federal agent who confirmed Seth Rich had made contact with Wikileaks using a cut out, two other people with direct access to Julian Assange also told Fox reporters that Seth was the source for the DNC emails.

The DNC sprang into action and moved aggressively to shut down the Fox story. Fox, along with Malia Zimmerman and Ed Butowsky, were sued by the Rich family and by investigator Rod Wheeler claiming that some or all elements of the story were false. The lawyers behind these suits were tied to the Democrats. In the face of this pressure, Fox News folded like a cheap tent in a hurricane and pulled the Malia Zimmerman story.

Too bad Fox lacked the courage to back Malia Zimmerman because the lawsuit fell apart. The cases were dismissed in August 2018:

A federal judge in Manhattan dismissed a lawsuit Thursday that was brought against Fox News by the parents of Seth Rich, the young Democratic aide whose unsolved murder was turned into fodder for a lingering right-wing conspiracy theory.

In his dismissal of the lawsuit, Judge George B. Daniels said he sympathized with Mr. Rich’s parents, but added that they had not been personally defamed by the story — despite the fact that it included “false statements or misrepresentations.”

Who killed Seth Rich remains a mystery. It is unfortunate that the Fox News story intermingled the speculation that Seth’s murder was a deliberate hit with the actual factual statements identifying him as the source of the DNC emails.

But now there is new information that may corroborate what the human sources quoted in the Fox article claimed about Seth’s role in getting the DNC documents to Wikileaks. Borne from a FOIA request filed in November 2017 by attorney Ty Clevenger, who requested any information regarding Seth Rich and and Julian Assange. The NSA informed Clevenger in a letter dated 4 October 2018 that:

Your request has been processed under the provisions of the FOIA. Fifteen documents (32 pages) responsive to your request have been reviewed by this Agency as required by the FOIA and have found to be currently and properly classified in accordance with Executive Order 13526. These documents meet the criteria for classification as set forth in Subparagraph (c) of Section 1.4 and remains classified TOP SECRET and SECRET.

If NSA had come back and said, “No, we do not have anything pertaining to Seth Rich,” that would have been news. It would have been especially unwelcome news for those who believe that Seth was the source on the DNC emails. But now the opposite is true. The NSA says that it has documents that are classified TS and S. What do those documents say or prove? That remains to be seen.

But there is other evidence that buttresses the claim that the DNC emails were physically downloaded and then transferred to Wikileaks rather than being taken via an electronic intrusion of the DNC network. This is not a matter of opinion. It is a simple matter of science and math.

As noted earlier, Guccifer 2.0 took credit in mid-June 2016 for “hacking” the DNC and published documents as proof of his culpability. Those documents contain meta data. Bill Binney, who served with distinction as a Technical Director at the NSA, has written extensively on this issue:

We stand by our main conclusion that the data from the intrusion of July 5, 2016, into the Democratic National Committee’s computers, an intrusion blamed on “Russian hacking,” was not a hack but rather a download/copy onto an external storage device by someone with physical access to the DNC.

That principal finding relied heavily on the speed with which the copy took place – a speed much faster than a hack over the Internet could have achieved at the time – or, it seems clear, even now. Challenged on that conclusion – often by those conducting experiments within the confines of a laboratory – we have conducted and documented additional tests to determine the speeds that can be achieved now, more than a year later.

To remind: We noted in the VIPS memo that on July 5, 2016, a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 megabytes of data in 87 seconds onto an external storage device. That yields a transfer rate of 22.7 megabytes per second. (https://consortiumnews.com/2017/09/20/more-holes-in-russia-gate-narrative/)

The meta data does not prove that Seth Rich did it or that it occurred at the DNC headquarters. But the meta data does conclusively show that the material provided by Guccifer 2.0, which the US DOJ now insists was a Russian front, could not have been obtained via a computer hack.

So what do we know for certain?

First, no one in the Federal Governemnt—law enforcement or intelligence—was granted access to examine the computer servers and files on the DNC server even after the DNC claimed they had been hacked by a foreign government.

Second, the steps that Crowdstrike allegedly took to shutdown computer hacking by Russia do not match the timeline of the actual download of the documents from the DNC server.

Third, Seth Rich worked at the DNC and had access to the computer server and systems.

Fourth, Wikileaks founder Julian Assange identified Seth Rich as a “source” and posted a $20,000 reward for information concerning his murder.

Fifth, a Federal law enforcement agent told two witnesesses that Seth Rich had email exchanges with Wikileaks.

Sixth, two people with direct access to Julian Assange told three separate sources that Seth Rich was the source of the DNC material published by Wikileaks.

Seventh, the documents published by Guccifer contain meta data that establish that the documents were physically downloaded onto a device like a thumb drive.

Eighth, the NSA has confirmed that it has Top Secret and Secret documents responsive to a FOIA request for information concerning contact between Seth Rich and other people including Julian Assange.

October 24, 2018 Posted by | Deception, Fake News, Mainstream Media, Warmongering, Russophobia, Timeless or most popular | , , , , | Leave a comment

Western Media Attacks Critics of the White Helmets

By Rick Sterling | Oriental Review | October 24, 2018

Introduction

The October 16 issue of NY Review of Books has an article by Janine di Giovani titled “Why Assad and Russia Target the White Helmets“. The article exemplifies how western media promotes the White Helmets uncritically and attacks those who challenge the myth.

Crude and Disingenuous Attack

Giovani’s article attacks several journalists by name. She singles out Vanessa Beeley and echoes the Guardian’s characterization of Beeley as the “high priestess of Syria propaganda”. She does this without challenging a single article or claim by the journalist. She might have acknowledged that Vanessa Beeley has some familiarity with the Middle East; she is the daughter of one of the foremost British Arabists and diplomats including British Ambassador to Egypt. Giovanni might have explored Beeley’s research in Syria that revealed the White Helmets founder (British military contractor James LeMesurier) assigned the name Syria Civil Defence despite the fact there is a real Syrian organization by that name that has existed since the 1950’s. For the past several years, Beeley has done many on-the-ground reports and investigations in Syria. None of these are challenged by Giovanni. Just days ago Beeley published a report on her visit to the White Helmets headquarters in Deraa.

Giovanni similarly dismisses another alternative journalist, Eva Bartlett. Again, Giovanni ignores the fact that Bartlett has substantial Middle East experience including having lived in Gaza for years. Instead of objectively evaluating the journalistic work of these independent journalists, Giovanni smears their work as “disinformation”. Presumably that is because their work is published at alternative sites such as 21st Century Wire and Russian media such as RT and Sputnik. Beeley and Bartlett surely would have been happy to have their reports published at the New York Review of Books, Newsweek or other mainstream outlets. But it’s evident that such reporting is not welcome there. Even Seymour Hersh had to go abroad to have his investigations on Syria published.

The New McCarthyism

Max Blumenthal is another journalist singled out by Giovanni. Blumenthal is the author of three books, including a New York Times bestseller and the highly acclaimed “Goliath: Life and Loathing in Greater Israel”. Giovanni describes his transition from “anti-Assad” to “pro-Assad” and suggests his change of perspective was due to Russian influence. She says, “Blumenthal went to Moscow on a junket to celebrate RT’s tenth anniversary. We don’t know what happened during that visit, but afterwards, Blumenthal’s views completely flipped.” Instead of examining the facts presented by Blumenthal in articles such as “Inside the Shadowy PR Firm that’s Lobyying for Regime Change in Syria“, Giovanni engages in fact-free McCarthyism. Blumenthal explained the transition in his thinking in a public interview. He also described the threats he experienced when he started to criticize the White Helmets and their public relations firm, but this is ignored by Giovanni.

Contrary to Giovanni’s assumptions, some western journalists and activists were exposing the White Helmets long before the story was publicized on Russian media. In spring 2015 the basic facts about the White Helmets including their origins, funding and role in the information war on Syria were exposed in my article “Seven Steps of Highly Effective Manipulators“. The article showed how the White Helmets were a key component in a campaign pushing for a “No Fly Zone” in Syria. It confirmed that the White Helmets is a political lobby force.

In spring 2016, Vanessa Beeley launched a petition “Do NOT give the Nobel Peace Prize to the White Helmets“. That petition garnered more support than a contrary petition urging the Nobel Prize committee to give the award to the White Helmets. Perhaps because of that, the petition was abruptly removed without explanation from the Change.org website. It was only at this time, with publicity around the heavily promoted nomination of the White Helmets for a Nobel Peace Prize that RT and other Russian media started to publicize and expose the White Helmets. That is one-and-a-half years after they were first exposed in western alternative media.

White Helmets and Chemical Weapons Accusations 

Giovanni ignores the investigations and conclusions of some of the most esteemed American journalists regarding the White Helmets and chemical weapons incidents in Syria.

The late Robert Parry published many articles exposing the White Helmets, for example “The White Helmets Controversy” and “Syria War Propaganda at the Oscars“. Parry wrote and published numerous investigations of the August 2013 chemical weapons attack and concluded the attacks were carried out by an opposition faction with the goal of pressuring the US to intervene militarily. Parry also challenged western conclusions regarding incidents such as April 4, 2017 at Khan Shaykhun. Giovanni breathlessly opens her article with this story while Parry revealed the impossibility of it being as described.

Buried deep inside a new U.N. report is evidence that could exonerate the Syrian government in the April 4 sarin atrocity and make President Trump look like an Al Qaeda dupe.

Legendary American journalist, Seymour Hersh, researched and refuted the assumptions of Giovanni and the media establishment regarding the August 2013 chemical weapons attacks near Damascus. Hersh’s investigation, titled “The Red Line and Rat Line“, provided evidence the atrocity was carried out by an armed opposition group with active support from Turkey. A Turkish member of parliament provided additional evidence. The fact that Hersh had to go across the Atlantic to have his investigation published suggests American not Russian disinformation and censorship.

In addition to ignoring the findings of widely esteemed journalists with proven track records, Giovanni plays loose with the truth. In her article she implies that a UN investigation blamed the Syrian government for the August 2013 attack. On the contrary, the head of the UN investigation team, Ake Sellstrom, said they did not determine who was responsible.

We do not have the evidence to say who did what …. The conflict in Syria is surrounded by a lot of rumors and a lot of propaganda, particularly when comes to the sensitive issue of chemical weapons.

First Responders or Western Funded Propagandists?

Giovanni says, “But the White Helmets’ financial backing is not the real reason why the pro-Assad camp is so bent on defaming them. Since 2015, the year the Russians began fighting in Syria, the White Helmets have been filming attacks on opposition-held areas with GoPro cameras affixed to their helmets.”

In reality, the ‘White Helmets” have a sophisticated media production and distribution operation. They have much more than GoPro cameras. In many of their movie segments one can see numerous people with video and still cameras. Sometimes the same incident will be shown with one segment with an Al Qaeda logo blending into the same scene with a White Helmets logo.

Giovanni claims “The Assad regime and the Russians are trying to neutralize the White Helmets because they are potential witnesses to war crimes.” However, the claims of White Helmet “witnesses” have little credibility. The White Helmet “volunteers” are paid three times as much as Syrian soldiers. They are trained, supplied and promoted by the same western states which have sought to regime change in Syria since 2011. An example of misleading and false claims by a White Helmets leader is exposed in Gareth Porter’s investigation titled “How a Syrian White Helmets Leader Played Western Media”. His conclusion could be directed to Giovanni and the NYReview of Books :

The uncritical reliance on claims by the White Helmets without any effort to investigate their credibility is yet another telling example of journalistic malpractice by media outlets with a long record of skewing coverage of conflicts toward an interventionist narrative.

When the militants (mostly Nusra/al Qaeda) were expelled from East Aleppo, civilians reported that the White Helmets were mostly concerned with saving their own and performing publicity stunts. For example, the photo of the little boy in east Aleppo looking dazed and confused in the back of a brand new White Helmet ambulance was essentially a White Helmet media stunt eagerly promoted in the West. It was later revealed the boy was not injured, he was grabbed without his parent’s consent. Eva Bartlett interviewed and photographed the father and family for her story “Mintpress Meets the Father of Iconic Aleppo Boy and says Media Lied About his Son“.

A Brilliant Marketing Success

The media and political impact of the White Helmets shows what money and marketing can do. An organization that was founded by a military contractor with funding from western governments was awarded the Rights Livelihood Award. The organization was seriously considered to receive the 2016 Nobel Peace Prize just three years after its formation.

The Netflix infomercial “The White Helmets” is an example of the propaganda. The scripted propaganda piece, where the producers did not set foot in Syria, won the Oscar award for best short documentary. It’s clear that lots of money and professional marketing can fool a lot of people. At $30 million per year, the White Helmets budget for one year is more than a decade of funding for the real Syrian Civil Defence which covers all of Syria not just pockets controlled by armed insurgents.

Unsurprisingly, it has been announced that White Helmets will receive the 2019 “Elie Wiesel” award from the heavily politicized and pro-Israel Holocaust Memorial Museum in Washington. This, plus the recent “rescue” of White Helmets by the Israeli government, is more proof of the true colors of the White Helmets. Vanessa Beeley’s recent interview with a White Helmet leader in Deraa revealed that ISIS and Nusra terrorists were part of the group “rescued” through Israel.

The Collapsing White Helmets Fraud

Giovanni is outraged that some journalists have successfully challenged and put a big dent in the White Helmets aura. She complains, “The damage the bloggers do is immense.”

Giovanni and western propagandists are upset because the myth is deflating. Increasing numbers of people – from a famous rock musician to a former UK Ambassador – see and acknowledge the reality.

As described in Blumenthal’s article, “How the White Helmets Tried to Recruit Roger Waters with Saudi Money“, rock legend Roger Waters says:

If we were to listen to the propaganda of the White Helmets and others, we would encourage our governments to start dropping bombs on people in Syria. This would be a mistake of monumental proportions…

Peter Ford, the former UK Ambassador to Syria, sums it up like this:

The White Helmets are jihadi auxiliaries… They are not, as claimed by themselves and by their supporters… simple rescuers. They are not volunteers. They are paid professionals of disinformation.

Giovanni claims her article is a “forensic take down of the Russian disinformation campaign to distort the truth in Syria.” In reality, Giovanni’s article is an example of western disinformation using subjective attacks on critics and evidence-free assertions aligned with the regime change goals of the West.

October 24, 2018 Posted by | Deception, Mainstream Media, Warmongering | , , | 1 Comment