By John Chuckman | Aletho News | November 19, 2015
Mass murder, as that which just occurred in Paris, is always distressing, but that does not mean we should stop thinking.
Isn’t it rather remarkable that President Hollande, immediately after the event, declared ISIS responsible? How did he know that? And if he was aware of a serious threat from ISIS, why did he not take serious measures in advance?
Within days of Friday 13, French forces assaulted an apartment with literally thousands of bullets being fired, killing a so-called mastermind, Abdelhamid Abaaoud. Just how are you instantly elevated to the rank of “mastermind”? And if security people were previously aware of his exalted status, why did they wait until after a disaster to go after him?
Well, the ugly underlying truth is that, willy-nilly, France for years has been a supporter of ISIS, even while claiming to be fighting it. How do I know that? Because France’s foreign policy has virtually no independence from America’s. It could be described as a subset of American foreign policy. Hollande marches around with his head held stiffly up after getting off the phone at the Élysée Palace, having received the day’s expectations from Washington. He has been a rather pathetic figure.
So long as it is doing work the United States wishes done, ISIS remains an American protectorate, and regardless of Hollande’s past rhetoric, he has acted according to that reality. But something may just have changed now.
It is important to note the disproportionate attention in the West to events in Paris. I say disproportionate because there are equally ugly things going on in a number of places in the Middle East, but we do not see the coverage given to Paris. We have bombs in Lebanon and Iraq. We have daily bombings and shootings in Syria. We have cluster bombs and other horrors being used by Saudi Arabia in Yemen. And of course, there are the ongoing horrors of Israel against Palestinians.
We have endless interviews with ordinary people in Paris, people who know nothing factual to help our understanding, about their reaction to the terror, but when was the last time you saw personal reactions broadcast from Gaza City or Damascus? It just does not happen, and it does raise the suspicion that the press’s concern with Paris is deliberately out of proportion. After all, Israel killed about twenty times as many people in Gaza not very long ago, and the toll was heavily weighted with children, many hundreds of them. Events in Paris clearly are being exploited for highly emotional leverage.
Leverage against what? Arabs in general and Muslims in particular, just part of the continuing saga of deliberately-channeled hate we have experienced since a group of what proved (after their arrest) to be Israeli spies were reported on top of a truck, snapping pictures and high-fiving each other as the planes hit the World Trade Center in 2001. What those spies were doing has never been explained to the public. I’m not saying Israel is responsible for 9/11, but clearly some Israeli government interests were extremely happy about events, and we have been bombarded ever since with hate propaganda about Muslims, serving as a kind of constant noise covering the crimes Israel does commit against Palestinians and other neighbors.
It is impossible to know whether the attack in Paris was actually the work of ISIS or a covert operation by the secret service of an ISIS supporter. The point is a bit like arguing over angels on a pinhead. When you are dealing with this kind of warfare – thugs and lunatics of every description lured into service and given deadly toys and lots of encouragement to use them – things can and do go wrong. But even when nothing goes wrong in the eyes of sponsors for an outfit like ISIS, terrible things are still happening. It’s just that they’re happening where the sponsors want them to happen and in places from which our press carefully excludes itself. Terrible things, for example, have been happening in the beautiful land of Syria for four or five years, violence equivalent to about two hundred Paris attacks, causing immense damage, the entire point of which is to topple a popularly-supported president and turn Syria into the kind of rump states we see now in Iraq.
A covert operation in the name of ISIS is at least as likely as an attack by ISIS. The United States, Israel, Turkey, and France are none of them strangers to violent covert activities, and, yes, there have been instances before when a country’s own citizens were murdered by its secret services to achieve a goal. The CIA pushed Italian secret services into undertaking a series of murderous attacks on their own people during the 1960s in order to shake up Italy’s “threatening” left-wing politics. It was part of something called Operation Gladio. Operation Northwoods, in the early 1960s, was a CIA-planned series of terrorist acts on American civilians to be blamed on Cuba, providing an excuse for another invasion. It was not carried out, but that was not owing to any qualms in the CIA about murdering their own, otherwise no plan would have ever existed. The CIA was involved in many other operations inside the United States, from experiments with drugs to ones with disease, using innocent people as its subject-victims.
There have been no differences worth mentioning between Hollande’s France and America concerning the Middle East. Whatever America wants, America gets, unlike the days when Jacques Chirac opposed the invasion of Iraq, or earlier, when de Gaulle removed France’s armed forces from integration within NATO or bravely faced immense hostility, including a coup attempt undertaken by French military with CIA cooperation, when he abandoned colonialism in Algeria.
If anything, Hollande has been as cloyingly obsequious towards America’s chief interest in the Middle East, Israel, as a group of Republican Party hopefuls at a Texas barbecue fund-raiser sniffing out campaign contributions. After the Charlie Hebdo attack, Hollande honored four Jewish victims of the thugs who attacked a neighborhood grocery store with France’s highest honor, the Legion of Honor. I don’t recall the mere fact of being murdered by thugs ever before being regarded as a heroic distinction. After all, in the United States more than twenty thousand a year suffer that fate without recognition.
Israel’s Netanyahu at the time of the Charlie Hebdo attack actually outdid himself in manic behavior. He barged into France against a specific request that he stay home and pushed himself, uninvited, to the front row of the big parade down the Champs-Élysées which was supposed to honor free speech. He wanted those cameras to be on him for voters back home watching.
Free speech, you might ask, from the leaders of Egypt, Turkey, the UAE, and Israel, who all marched in front? Well, after the free-speech parody parade, the Madman of Tel Aviv raced around someone else’s country making calls and speeches for Jewish Frenchmen to leave “dangerous” France and migrate “home” to Israel. It would in fact be illegal in Israel for someone to speak that way in Israel to Israelis, but illegality has never bothered Netanyahu. Was he in any way corrected for this world-class asinine behavior? No, Hollande just kept marching around with his head stiffly up. I guess he was trying to prove just how free “free speech” is in France.
But speech really isn’t all that free in France, and the marching about free speech was a fraud. Not only is Charlie Hebdo, the publication in whose honor all the tramping around was done, not an outlet for free speech, being highly selective in choosing targets for its obscene attacks, but many of the people marching at the head of the parade were hardly representatives of the general principle.
France itself has outlawed many kinds of free speech. Speech and peaceful demonstrations which advocate a boycott of Israel are illegal in France. So a French citizen today cannot advocate peacefully against a repressive state which regularly abuses, arrests, and kills some of the millions it holds in a form of bondage. And Hollande’s France enforces this repressive law with at least as much vigor as Israel does with its own version, in a kind of “Look, me too,” spirit. France also has a law which is exactly the equivalent of a law against anyone’s saying the earth is flat: a law against denying or questioning the Holocaust. France also is a country, quite disgracefully, which has banned the niqab.
Now, America’s policy in the Mideast is pretty straightforward: subsidize and protect its colony Israel and never criticize it even on the many occasions when it has committed genuine atrocities. American campaign finance laws being what the are, politics back home simply permits no other policy. The invasion of Iraq, which largely was intended to benefit Israel through the elimination of a major and implacable opponent, has like so many dark operations backfired. I call the invasion a dark operation because although the war was as public as could be, all of America’s, and Britain’s, supposed intelligence about Iraq was crudely manufactured and the reasons for undertaking an act which would kill a million people and cripple an entire country were complete lies.
America’s stupid invasion created new room for Iran to exert its influence in the region – hence, the endless noise in Israel and Saudi Arabia about Iran – and it led directly to the growth of armed rabble groups like ISIS. There were no terrorists of any description in Saddam’s Iraq, just as there were no terrorists in Gadhafi’s Libya, a place now so infested with them that even an American ambassador is not safe.
Some Americans assert that ISIS happened almost accidentally, popping out of the dessert when no one was looking, a bit like Athena from the head of Zeus, arising from the bitterness and discontents of a splintered society, but that view is fatuous. Nothing, absolutely nothing, happens by accident in this part of the world. Israel’s spies keep informed of every shadowy movement, and America always listens closely to what they say.
It is silly to believe ISIS just crept up on America, suddenly a huge and powerful force, because ISIS was easy for any military to stop at its early stages, as when it was a couple of thousand men waving AK-47s from the backs of Japanese pick-up trucks tearing around Iraq. Those pick-up trucks and those AK-47s and the gasoline and the ammunition and the food and the pay required for a bunch of goons came from somewhere, and it wasn’t from Allah.
A corollary to America’s first principle about protecting Israel is that nothing, absolutely nothing, happens in Israel’s neighborhood that is not approved, at least tacitly, by the United States. So whether,
in any given instance of supply and support for ISIS, it was Israel or Saudi Arabia or Turkey or America – all involved in this ugly business – is almost immaterial. It all had to happen with American approval. Quite simply, there would be hell to pay otherwise.
As usual in the region, Saudi Arabia’s role was to supply money, buying weapons from America and others and transshipping them to ISIS. Ever since 9/11, Saudi Arabia has been an almost pathetically loyal supporter of America, even to the extent now of often cooperating with Israel. That couldn’t happen before an event in which the majority of perpetrators proved to be Saudi citizens and which led to the discovery that large amounts of Saudi “go away” money had been paid to Osama bin Laden for years. But after 9/11, the Saudis feared for the continuation of their regime and now do what they are told. They are assisted in performing the banking function by Qatar, another wealthy, absolute state aligned with the United States and opposing the rise of any possibly threatening new forces in its region.
Of course, it wasn’t just the discoveries of 9/11 that motivated Saudi Arabia. It intensely dislikes the growing influence of Iran, and Iran’s Shia Muslim identity is regarded by Sunni sects in Saudi Arabia in much the way 17th century Protestantism was viewed by an ultramontane Catholic state like Spain. The mass of genuine jihadists fighting in Syria – those who are not just mercenaries and adventurers or agents of Israel or Turkey or the Saudis – are mentally-unbalanced Sunni who believe they are fighting godlessness. The fact that Assad keeps a secular state with religious freedom for all just adds to their motivation.
ISIS first achievement was toppling an Iraqi government which had been excessively friendly to Iran in the view of Israel, and thereby the United States. Iraq’s army could have stopped them easily early on but was bribed to run away, leaving weapons such as tanks behind. Just two heavy tanks could have crushed all the loons in pick-up trucks. That’s why there was all the grotesque propaganda about beheadings and extreme cruelty to cover the fact of modern soldiers running from a mob. ISIS gathered weapons, territory, and a fierce reputation in an operation which saw President al-Maliki – a man disliked by the United States for his associations with Iran and his criticism of American atrocities – hurriedly leave office.
From that base, ISIS was able to gain sufficient foothold to begin financing itself through, for example, stolen crude sold at a discount or stolen antiquities. The effective splitting up of Iraq meant that its Kurdish population in the north could sell, as it does today, large volumes of oil to Israel, an unheard of arrangement in Iraq’s past. ISIS then crossed into Syria in some force to go after Assad. The reasons for this attack were several: Assad runs a secular state and defends religious minorities but mainly because the paymasters of ISIS wanted Assad destroyed and Syria reduced in the fashion of Iraq.
Few people in the press seem to have noted that ISIS never attacks Israel or Israeli interests. Neither does it attack the wheezingly-corrupt rulers of Saudi Arabia, the Islamic equivalent of ancient Rome’s Emperor Nero. Yet those are the very targets a group of genuine, independent warrior-fundamentalists would attack. But ISIS is not genuine, being supplied and bankrolled by people who do not want to see attacks on Israel or Saudi Arabia, including, notably, Israel and Saudi Arabia. ISIS also is assisted, and in some cases led, by foreign covert operators and special forces.
There does seem to be a good deal of news around the idea of France becoming serious in fighting ISIS, but I think we must be cautious about accepting it at face value. Putin is reported as telling ship commanders in the Mediterranean to cooperate and help cover the French aircraft carrier approaching. Hollande keeps calling for American cooperation too, as Putin has done for a very long time, but America’s position remains deliberately ambiguous. A new American announcement of cooperation with Turkey in creating a “safe zone” across the border with northern Syria is a development with unclear intentions. Is this to stop the Kurds Erdogan so despises fighting in the north of Syria from establishing themselves and controlling the border or is it a method for continued support of ISIS along the that border? Only time will tell.
I do think it at least possible Hollande may have come around to Putin’s view of ISIS, but America has not, and the situation only grows more fraught with dangerous possibilities. I’ve long believed that likely America, in its typically cynical fashion, planned to destroy ISIS, along with others like al-Nusra, once they had finished the dirty work of destroying Syria’s government and Balkanizing the country. In any event, Israel – and therefore, automatically, America – wants Assad destroyed, so it would be surprising to see America at this point join honestly with Putin and Hollande.
America has until now refused Russia any real support, including such basic stuff as sharing intelligence. It cooperates only in the most essential matters such avoiding attacks on each other’s planes. It also has made some very belligerent statements about what Russia has been doing, some from the America’s Secretary of Defense sounding a lot like threats. Just the American establishment’s bully-boy attitude about doing anything which resembles joining a Russian initiative does not bode well.
After all, Putin has been portrayed as a kind of Slavic Satan by American propaganda cranking stuff out overtime in support of Ukraine’s incompetent coup-government and with the aim of terrifying Eastern Europe into accepting more American weapons and troops near Russia’s border, this last having nothing to do with any Russian threat and everything to do with America’s aggressive desire to shift the balance of power. How do you turn on a dime and admit Putin is right about Syria and follow his lead?
And there are still the daily unpleasant telephone calls from Israel about Assad. How do you manoeuvre around that when most independent observers today recognize Assad as the best alternative to any other possible government. He has the army’s trust, and in the end it is the Syrian army which is going to destroy ISIS and the other psychopaths. Air strikes alone can never do that. The same great difficulty for Hollande leaves much ambiguity around what he truly means by “going to war against ISIS.”
It is an extremely complicated world in which we live with great powers putting vast resources towards destroying the lives of others, almost killing thousands on a whim, while pretending not to be doing so. We live in an era shaped by former CIA Director Allen Dulles, a quiet psychopath who never saw an opportunity for chaos he did not embrace.
The only way to end terror is to stop playing with the lives of tens of millions in the Middle East, as America has done for so long, and stop supporting the behaviors of a repressive state which has killed far greater numbers than the madmen of ISIS could dream of doing, demanding instead that that state make peace and live within its borders. But, at least at this stage, that is all the stuff of dreams.
The U.S. National Security Agency accessed the internal communications of Venezuela’s state-owned oil company, Petroleos de Venezuela and acquired sensitive data it planned to exploit in order to spy on the company’s top officials, according to a highly classified NSA document that reveals the operation was carried out in concert with the U.S. embassy in Caracas.
The March 2011 document, labeled, “top secret,” and provided by former NSA contractor-turned-whistleblower Edward Snowden, is being reported on in an exclusive partnership between teleSUR and The Intercept.
Drafted by an NSA signals development analyst, the document explains that PDVSA’s network, already compromised by U.S. intelligence, was further infiltrated after an NSA review in late 2010 – during President Barack Obama’s first term, which would suggest he ordered or at least authorized the operation – “showed telltale signs that things were getting stagnant on the Venezuelan Energy target set.” Most intelligence “was coming from warranted collection,” which likely refers to communications that were intercepted as they passed across U.S. soil. According to the analyst, “what little was coming from other collectors,” or warrantless surveillance, “was pretty sparse.”
Beyond efforts to infiltrate Venezuela’s most important company, the leaked NSA document highlights the existence of a secretive joint operation between the NSA and the Central Intelligence Agency operating out of the U.S. embassy in Caracas. A fortress-like building just a few kilometers from PDVSA headquarters, the embassy sits on the top of a hill that gives those inside a commanding view of the Venezuelan capital.
Last year, Der Spiegel published top-secret documents detailing the state-of-the-art surveillance equipment that the NSA and CIA deploy to embassies around the world. That intelligence on PDVSA had grown “stagnant” was concerning to the U.S. intelligence community for a number of reasons, which its powerful surveillance capabilities could help address.
“Venezuela has some of the largest oil and natural gas reserves in the world,” the NSA document states, with revenue from oil and gas accounting “for roughly one third of GDP” and “more than half of all government revenues.”
“To understand PDVSA,” the NSA analyst explains, “is to understand the economic heart of Venezuela.”
Increasing surveillance on the leadership of PDVSA, the most important company in a South American nation seen as hostile to U.S. corporate interests, was a priority for the undisclosed NSA division to which the analyst reported. “Plainly speaking,” the analyst writes, they “wanted PDVSA information at the highest possible levels of the corporation – namely, the president and members of the Board of Directors.”
Given a task, the analyst got to work and, with the help of “sheer luck,” found his task easier than expected.
It began simply enough: with a visit to PDVSA’s website, “where I clicked on ‘Leadership’ and wrote down the names of the principals who would become my target list.” From there, the analyst “dumped the names” into PINWALE, the NSA’s primary database of previously intercepted digital communications, automatically culled using a dictionary of search terms called “selectors.” It was an almost immediate success.
In addition to email traffic, the analyst came across over 10,000 employee contact profiles full of email addresses, phone numbers, and other useful targeting information, including the usernames and passwords for over 900 PDVSA employees. One profile the analyst found was for Rafael Ramirez, PDVSA’s president from 2004 to 2014 and Venezuela’s current envoy to the United Nations. A similar entry turned up for Luis Vierma, the company’s former vice president of exploration and production.
“Now, even my old eyes could see that these things were a goldmine,” the analyst wrote. The entries were full of “work, home, and cell phones, email addresses, LOTS!” This type of information, referred to internally as “selectors,” can then be “tasked” across the NSA’s wide array of surveillance tools so that any relevant communications will be saved.
According to the analyst, the man to whom he reported “was thrilled!” But “it is what happened next that really made our day.”
“As I was analyzing the metadata,” the analyst explains, “I clicked on the ‘From IP’ and noticed something peculiar,” all of the employee profile, “over 10,000 of them, came from the same IP!!!” That, the analyst determined, meant “I had been looking at internal PDVSA comms all this time!!! I fired off a few emails to F6 here and in Caracas, and they confirmed it!”
“Metadata” is a broad term that can include the phone numbers a target has dialed, the duration of the call and from where it was placed, as well as the Wi-Fi networks used to access the Internet, the websites visited and the times accessed. That information can then be used to identify the user.
F6 is the NSA code name for a joint operation with the CIA known as the Special Collection Service, based in Beltsville, Maryland – and with agents posing as diplomats in dozens of U.S. embassies around the world, including Caracas, Bogota and Brasilia.
In 2013, Der Spiegel reported that it was this unit of the U.S. intelligence bureaucracy that had installed, within the U.S. embassy in Berlin, “sophisticated listening devices with which they can intercept virtually every popular method of communication: cellular signals, wireless networks and satellite communication.” The article suggested this is likely how the U.S. tapped into German Chancellor Angela Merkel’s cellphone.
SCS at the U.S. embassy in Caracas played an active role throughout the espionage activities described in the NSA document. “I have been coordinating with Caracas,” the NSA analyst states, “who have been surveying their environment and sticking the results into XKEYSCORE.”
XKEYSCORE, as reported by The Intercept, processes a continuous “flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network,” storing the data for 72 hours on a “rolling buffer” and “sweep[ing] up countless people’s Internet searches, emails, documents, usernames and passwords.”
The NSA’s combined databases are, essentially, “a very ugly version of Google with half the world’s information in it,” explained Matthew Green, a professor at the Johns Hopkins Information Security Institute, in an email. “They’re capturing so much information from their cable taps, that even the NSA analysts don’t know what they’ve got,” he added, “an analyst has to occasionally step in and manually dig through the data” to see if the information they want has already been collected.
That is exactly what the NSA analyst did in the case of PDVSA, which turned up even more leads to expand their collection efforts.
“I have been lucky enough to find several juicy pdf documents in there,” the NSA analyst wrote, “one of which has just been made a report.”
That report, dated January 2011, suggests a familiarity with the finances of PDVSA beyond that which was public knowledge, noting a decline in the theft and loss of oil.
“In addition, I have discovered a string that carries user ID’s and their passwords, and have recovered over 900 unique user/password combinations” the analyst wrote, which he forwarded to the NSA’s elite hacking team, Targeted Access Operations, along with other useful information and a “targeting request to see if we can pwn this network and especially, the boxes of PDVSA’s leadership.”
“Pwn,” in this context, means to successfully hack and gain full access to a computer or network. “Pwning” a computer, or “box,” would allow the hacker to monitor a user’s every keystroke.
A History of US Interest in Venezuelan Affairs
PDVSA has long been a target of U.S. intelligence agencies and the subject of intense scrutiny from U.S. diplomats. A February 17, 2009, cable, sent from the U.S. ambassador in Caracas to Washington and obtained by WikiLeaks, shows that PDVSA employees, were probed during visa interviews about their company’s internal operations. The embassy was particularly interested in the PDVSA’s strategy concerning litigation over Venezuela’s 2007 nationalization of the Cerro Negro oil project – and billions of dollars in assets owned by U.S. oil giant ExxonMobil.
“According to a PDVSA employee interviewed following his visa renewal, PDVSA is aggressively preparing its international arbitration case against ExxonMobil,” the cable notes.
A year before, U.S. State Department spokesman Sean McCormack told reporters that the U.S. government “fully support the efforts of ExxonMobil to get a just and fair compensation package for their assets.” But, he added, “We are not involved in that dispute.”
ExxonMobil is also at the center of a border dispute between Guyana and Venezuela. In May 2015, the company announced it had made a “significant oil discovery” in an offshore location claimed by both countries. The U.S. ambassador to Guyana has offered support for that country’s claim.
More recently, the U.S. government has begun leaking information to media about allegations against top Venezuelan officials.
In October, The Wall Street Journal reported in a piece, “U.S. Investigates Venezuelan Oil Giant,” that “agents from the Department of Homeland Security, the Drug Enforcement Administration, the Federal Bureau of Investigation and other agencies” had recently met to discuss “various PDVSA-related probes.” The “wide-ranging investigations” reportedly have to do with whether former PDVSA President Rafael Ramirez and other executives accepted bribes.
Leaked news of the investigations came less than two months before Dec. 6 parliamentary elections in Venezuela. Ramirez, for his part, has rejected the accusations, which he claims are part of a “new campaign that wants to claim from us the recovery and revolutionary transformation of PDVSA.” Thanks to Chavez, he added, Venezuela’s oil belongs to “the people.”
In its piece on the accusations against him, The Wall Street Journal notes that during Ramirez’s time in office PDVSA became “an arm of the late President Hugo Chavez’s socialist revolution,” with money made from the sale of petroleum used “to pay for housing, appliances and food for the poor.”
The former PDVSA president is not the only Venezuelan official to be accused of corruption by the U.S. government. In May 2015, the U.S. Department of Justice accused Diosdado Cabello, president of the Venezuelan National Assembly, of being involved in cocaine trafficking and money laundering. Former Interior Minister Tarek El Aissami, the former director of military intelligence, Hugo Carvajal, and Nestor Reverol, head of the National Guard, have also faced similar accusations from the U.S. government.
None of these accusations against high-ranking Venezuelan officials has led to any indictments.
The timing of the charges, made in the court of public opinion rather than a courthouse, has led some to believe there’s another motive.
“These people despise us,” Venezuelan President Nicolas Maduro said in October. He and his supporters argue the goal of the U.S. government’s selective leaks is to undermine his party ahead of the upcoming elections, helping install a right-wing opposition seen as friendlier to U.S. interests. “They believe that we belong to them.”
Loose Standards for NSA Intelligence Sharing
Ulterior motives or not, by the NSA’s own admission the intelligence it gathers on foreign targets may be disseminated widely among U.S. officials who may have more than justice on their minds.
According to a guide issued by the NSA on January 12, 2015, the communications of non-U.S. persons may be captured in bulk and retained if they are said to contain information concerning a plot against the United States or evidence of, “Transnational criminal threats, including illicit finance and sanctions evasion.” Any intelligence that is gathered may then be passed on to other agencies, such as the DEA, if it “is related to a crime that has been, is being, or is about to be committed.”
Spying for the sole purpose of protecting the interests of a corporation is ostensibly not allowed, though there are exceptions that do allow for what might be termed economic espionage.
“The collection of foreign private commercial information or trade secrets is authorized only to protect nation the national security of the United States or its partners and allies,” the agency states. It is not supposed to collect such information “to afford a competitive advantage to U.S. companies and U.S. business sectors commercially.” However, “Certain economic purposes, such as identifying trade or sanctions violations or government influence or direction, shall not constitute competitive advantage.”
In May 2011, two months after the leaked document was published in NSA’s internal newsletter, the U.S. State Department announced it was imposing sanctions on PDVSA – a state-owned enterprise, or one that could be said to be subject to “government influence or direction” – for business it conducted with the Islamic Republic of Iran between December 2010 and March 2011. The department did not say how it obtained information about the transactions, allegedly worth US$50 million.
Intelligence gathered with one stated purpose can also serve another, and the NSA’s already liberal rules on the sharing of what it gathers can also be bent in times of perceived emergency.
“If, due to unanticipated or extraordinary circumstances, NSA determines that it must take action in apparent departure from these procedures to protect the national security of the United States, such action may be taken” – after either consulting other branches of the intelligence bureaucracy. “If there is insufficient time for approval,” however, it may unilaterally take action.
Beyond the obvious importance of oil, leaked diplomatic cables show PDVSA was also on the U.S. radar because of its importance to Venezuela’s left-wing government. In 2009, another diplomatic cable obtained by WikiLeaks shows the U.S. embassy in Caracas viewed PDVSA as crucial to the political operations of long-time foe and former President Hugo Chavez. In April 2002, Chavez was briefly overthrown in a coup that, according to The New York Times, as many as 200 officials in the George W. Bush administration – briefed by the CIA – knew about days before it was carried out.
The Venezuelan government was not informed of the plot.
“Since the December 2002-February 2003 oil sector strike, PDVSA has put itself at the service of President Chavez’s Bolivarian revolution, funding everything from domestic programs to Chavez’s geopolitical endeavors,” the 2009 cable states.
Why might that be a problem, from the U.S. government’s perspective? Another missive from the U.S. embassy in Caracas, this one sent in 2010, sheds some light: Chavez “appears determined to shape the hemisphere according to his vision of ‘socialism in the 21st century,’” it states, “a vision that is almost the mirror image of what the United States seeks.”
There was a time when not so long ago when the U.S. had an ally in Venezuela, one that shared its vision for the hemisphere – and invited a U.S. firm run by former U.S. intelligence officials to directly administer its information technology operations.
Amid a push for privatization under former Venezuelan President Rafael Caldera, in January 1997 PDVSA decided to outsource its IT system to a joint a company called Information, Business and Technology, or INTESA – the product of a joint venture between the oil company, which owned a 40 percent share of the new corporation, and the major U.S.-based defense contractor Science Applications International Corporation, or SAIC, which controlled 60 percent.
SAIC has close, long-standing ties to the U.S. intelligence community. At the time of its dealings with Venezuela, the company’s director was retired Admiral Bobby Inman. Before coming to SAIC, Inman served as the U.S. Director of Naval Intelligence and Vice Director of the U.S. Defense Intelligence Agency. Inman also served as deputy director of the CIA and, from 1977 to 1981, as director of the NSA.
In his book, “Changing Venezuela by Taking Power: The History and Policies of the Chavez Government,” author Gregory Wilpert notes that Inman was far from the only former intelligence official working for SAIC in a leadership role. Joining him were two former U.S. Secretaries of Defense, William Perry and Melvin Laird, a former director of the CIA, John Deutsch, and a former head of both the CIA and the Defense Department, Robert Gates. The company that those men controlled, INTESA, was given the job of managing “all of PDVSA’s data processing needs.”
In 2002, Venezuela, now led by a government seeking to roll back the privatizations of its predecessor, chose not to renew SAIC’s contract for another five years, a decision the company protested to the U.S. Overseas Private Investment Corporation, which insures the overseas investments of U.S. corporations. In 2004, the U.S. agency ruled that by canceling its contract with SAIC the Venezuelan government had “expropriated” the company’s investment.
However, before that ruling, and before its operations were reincorporated by PDVSA, the company that SAIC controlled, INTESA, played a key role in an opposition-led strike aimed at shutting down the Venezuelan oil industry. In December 2002, eight months after the failed coup attempt and the same month its contract was set to expire, INTESA, the Venezuelan Ministry of Communication and Information alleges, “exercised its ability to control our computers by paralyzing the charge, discharge, and storage of crude at different terminals within the national grid.” The government alleges INTESA, which possessed the codes needed to access those terminals, refused to allow non-striking PDVSA employees access to the company’s control systems.
“The result,” Wilpert noted, “was that PDVSA could not transfer its data processing to new systems, nor could it process its orders for invoices for oil shipments. PDVSA ended up having to process such things manually because passwords and the general computing infrastructure were unavailable, causing the strike to be much more damaging to the company than it would have been if the data processing had been in PDVSA’s hands.”
PDVSA’s IT operations would become a strictly internal affair soon thereafter, though one never truly free from the prying eyes of hostile outsiders.
Even before the victims of the Paris attacks had been moved from the scene or their bodies identified, members of the US national security state began speculating that encryption was likely part of the reason the terrorists were able to plot and execute their deadly mission without getting caught. Former CIA director Mike Morrell was one of the many people who advanced this theory.
“I think what we’re going to learn is that these guys are communicating via these encrypted apps, this commercial encryption which is very difficult or nearly impossible for governments to break, and the producers of which don’t produce the keys necessary for law enforcement to read the encrypted messages,” he said.
Well, Morrell and his fellow deep state power-pushers appear to be wrong. New reports indicate that the attackers actually used text messages to communicate—plain text text messages.
But does it even matter? The point the spooks are trying to make is that encryption is too dangerous for a free society to tolerate. If bad guys use it to hurt us, it means law enforcement should be able to break encryption technology that billions of people on earth use to securely transfer money, communicate, and share sensitive data.
That’s absurd. Encryption is a tool. Like many tools, it can be used by people who have good motivations or bad ones. Every security specialist worth her salt says that weakening encryption, or installing “backdoors” for cops and spies, would actually put people at greater security risk. That’s because encryption is a security technology.
This time, when the spies tried to smear security technologies in the wake of these horrific murders, they were factually wrong—these attackers didn’t even encrypt their communications. But someday we will likely find evidence that other terrorists indeed did use encryption to plot their attack. It doesn’t matter. Those terrorists will probably also use cars, face to face communication, and walks in the woods to speak without risking that the prying ears of government agents can hear them. And furthermore, investigators in France—which last spring implemented broad new snooping powers—failed to intervene in the Paris plot when the attackers didn’t use encryption. In France, encryption was not the problem.
In the United States, the Fourth Amendment is supposed to protect us from unwarranted government intrusion into our private lives. That bedrock principle of American law makes it harder for police to figure out who is up to no good. That’s by design.
There may very well someday be a case where ISIS operatives use encryption tools to plan a nefarious attack. But when that day comes, the basic facts about encryption, security, and the law won’t have changed. Encryption protects the security of billions of transactions and communications every day—from hackers, foreign governments, and cops who skirt Fourth Amendment law by using stingrays to wiretap people’s private conversations.
When we are confronted with despicable acts like the Paris attacks, our response cannot be to throw our values out the window in a fearful stupor. There are people with bad intentions in the world, yes. But weakening our digital security in response to their violence has the ultimate effect of punishing ourselves. It won’t work, and it’s not smart. Remember that the next time you hear spies spewing fact-free hysteria before the blood has even dried.
The CIA and government officials around the world are using the Paris attacks to push brand new surveillance laws. And it was all planned in advance.
While democratic systems usually take months (if not years) to pass new laws and legislation, it only took a few days after the Paris attacks to slap honest citizens with more surveillance laws. Several organizations are indeed capitalizing on the fear and panic caused by the attacks to bring forth a brand new agenda that takes a bold new step towards total government surveillance. What’s worse: Leaked information proves that authorities were waiting on a terror attack to go forward with their plan.
In a leaked e-mail written by Robert S. Litt, the intelligence community’s top lawyer during the month August, the plan is clearly outlined: There is a lack of support for the banning of encrypted communications but a terror attack could quickly turn the tide.
“Although the legislative environment is very hostile today, it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement.
Only a few months after this e-mail, a terror attack occurs in Paris. Only a few hours after the attacks, news strangely blamed “encrypted communications.” Only days after the attacks, officials are calling for… the banning of encrypted communications.
The New York police commissioner, Bill Bratton, called it a “game changer” and, insinuated new legislation that would outlaw encryption was necessary by adding: “[Encryption] is something that is going to need to be debated very quickly because we cannot continue operating where we are blind. – The Guardian, Intelligence agencies pounce on Paris attacks to pursue spy agenda
CIA Director John Brennan is also using the terror attacks to plead for unrestricted government surveillance of all communications, blaming “privacy groups” for hindering their job.
Then on Monday, in an epic episode of blame shifting, the CIA director, John Brennan, reportedly said privacy advocates have undermined the ability of spies to monitor terrorists. He explained:
“Because of a number of unauthorized disclosures and a lot of hand-wringing over the government’s role in the effort to try to uncover these terrorists, there have been some policy and legal and other actions that are taken that make our ability collectively, internationally to find these terrorists much more challenging,” adding that there is a “misrepresentation of what the intelligence security services are doing.”
Read Brennan’s comments carefully because they are very revealing. When he says “legal actions,” he’s referring to the fact that multiple federal courts have ruled that the government’s secret mass surveillance on millions of Americans is illegal. So it sounds like the CIA director is saying it’s a shame that intelligence agencies can’t operate completely above the law any more, and is scapegoating any failings on his agency’s part on accountability that is the hallmark of any democracy. (Though he still can apparently operate above the law.)
More importantly, Brennan’s comments are incredibly dishonest. The post-Snowden USA Freedom Act passed by Congress reformed exactly one of the countless mass spying programs the US runs. It was the one that sucked up the phone calls of Americans only, and here’s the thing: it has been active this whole time and isn’t scheduled to shut down until the end of the month. – Ibid.
Government officials in the UK are also capitalizing on fear to rush sweeping new laws.
“On the other side of the Atlantic, politicians in the United Kingdom, which already has the most expansive surveillance laws in the western world, are using the tragedy to attempt to rush through their even more invasive, new mass-spying bill that aims at allowing police to see the websites every citizen visits and to force companies like Apple to backdoor their encrypted tools.”– Ibid.
Not Effective
None of these laws have proven effective in preventing terror attacks. In fact, the Paris attacks took place six months after the enactment of a massive (and controversial) surveillance law in France.
Passed by the French Parliament in May in response to the attacks on the Paris-based magazine Charlie Hebdo, the law allows the government to monitor phone calls and emails of people suspected of connections to terrorism without the authorization of a judge.
But it goes further than that. The law requires Internet service providers to install “black boxes” that are designed to vacuum up and analyze metadata on the Web-browsing and general Internet use habits of millions of people using the Web and to make that data available to intelligence agencies.
In exceptional cases, the law allows the government to deploy what are called “ISMI catchers” to track all mobile phone communications in a given area. These catchers are basically designed to impersonate cell towers, but they intercept and record communications data from phones within its range, and can also track the movements of people carrying the phones.
Finally, the law allows government agents to break into the homes of suspected terrorists for the purpose of planting microphone bugs and surveillance cameras and installing keyloggers on their computers, devices that capture data on every keystroke and mouse click. – Recode, France Has a Powerful and Controversial New Surveillance Law
In short, after each traumatic event in the Western world (manufactured or not), attention is turned towards a very specific and targeted item that “needs to be addressed as soon as possible.” This item is, in fact, part of controversial law that is sitting on shelves until in can be passed insidiously, while the masses are struck with horror. It happened with the Patriot Act and, almost 15 years later, it is happening again. Their formula is “Order Out of Chaos” and it keeps working.
“Where no counsel is, the people fall, but in the multitude of counselors there is safety.” – Mossad Motto
~
On the 13th November 2015 during the Paris attacks, 4.1 million people submitted their personal details to the Facebook Safety App, 360 million people received Facebook messages reassuring them of their friends and family’s safety. This information may well have been deposited into an Israeli intelligence bank.
Paris 13/11 aftershocks.
As the dust settles and the pall of grief envelops the scenes of the 13/11 Paris attacks, information begins to seep through the inevitable cracks in the mainstream media, security apparatus narrative.
Very few “subversive” media outlets in France do as good a job of deconstruction as Panamza. Their reporting on the Charlie Hebdo affair blazed a trail of evidence to counter the sprawling inaccuracies of the “official” storyline. Their articles over the last two days have motivated my investigation into the insidious drivers possibly behind the 13/11 attacks on the French capital.
Unsurprisingly the common denominator connecting both Charlie Hebdo and Paris 13/11 appears to be the covert involvement of the Israeli security apparatus.
Lets return to the scene of mayhem and bloodshed in Paris on Friday night. The panic that spread like wildfire across social media, tearful messages and desperate attempts to connect with loved ones, suspected to be in the firing zone.
Then suddenly, Facebook “sympathetically” employed its Safety Check APP, to enable terrified families to reconnect with their missing relatives and to reassure themselves of their safety as the bullets ricocheted off the walls & streets of Paris.
The Safety Check APP was originally named the Disaster Message Board and was introduced on October 15, 2014. Its first major deployment was on Saturday April 25 2015 in the wake of the April 2015 Nepal Earthquake. The tool has since been utilised after the May 2015 Nepal earthquake and the Pacific Hurricane Patricia October 2015.
The 13/11 Paris attack was the first time that this Safety Check APP was deployed for an “unnatural” disaster. Over 4.1 million people checked in with friends and relatives, a total of 360 million people received messages that their loved ones were “safe”.
Alex Schultz: Facebook’s vice president of Growth:
“We chose to activate Safety Check in Paris because we observed a lot of activity on Facebook as the events were unfolding. In the middle of a complex, uncertain situation affecting many people, Facebook became a place where people were sharing information and looking to understand the condition of their loved ones… This activation will change our policy around Safety Check and when we activate it for other serious and tragic incidents in the future. We want this tool to be available whenever and wherever it can help.”
Wonderful, I hear you exclaim! Wonderful for whom?
“During the 24 hours after the terror attack, 4.1 million people checked in with friends and relatives using Facebook Safety Check, a technology developed by Facebook Israel’s research and development department,” said a spokesperson for Facebook Israel. “A total of 360 million people received messages that their loved ones were safe.”
The Facebook Safety Check was designed by Roi Tiger, currently Director of Engineering at Facebook, previously Co-Founder, with Guy Rosen, of Onavo which was bought by Facebook in October 2013.
Perhaps coincidence but this acquistion slots neatly into the timeline with the long since debunked Ghouta Chemical weapons claims against the Syrian Government and the seed funding of White House, UK Foreign Office, CIA, Soros backed and funded Syria Civil Defence Group aka the White Helmets.
Roi Tiger Facebook Profile Picture.
Roi Tiger is a graduate of IDC Herzliya, Tel Aviv, a “non profit” education organisation dedicated to the promotion of Zionist ideology and the fortification of the illegal state of Israel.
IDC HERZLIYA is committed to the fundamental values of a free and tolerant society, while maintaining a Zionist philosophy – first and foremost, freedom of the individual for self-realization in all realms of thought and action, while striving to strengthen the State of Israel.
Roi Tiger then went on to join the IOF Elite 8200 division, an Israeli Intelligence Corps responsible for collecting signal intelligence (SIGINT) and code decryption, described in 2010 by Le Monde diplomatique, as a massive spying operation. Also in 2010, implicated by US Intelligence in Operation Orchard, the 2007 Israeli air strikes on an alleged nuclear reactor in the Deir Ezzor region of Syria.
Full background to this 2007 Israeli illegal incursion into Syrian airspace here.
So, when people innocently clicked “safe” or put a name of their loved ones into the search box of the Facebook Safety app, it is quite probable that they fed a stream of information directly into the Israeli Intelligence data banks.
Web front page of Internet.org
Onavo, a relatively small start-up comprising 40 employees, was based in Tel Aviv and was bought by Mark Zuckerburg as part of his all consuming internet.org project which has as its objective, to create universal access to the Internet.
The significance of this purchase is manifold.
It is Facebook’s first foray onto Israeli territory. In 2012 they purchased Face.com, an Israeli company focused on powerful facial recognition but this had not precipitated an actual base in Israel. With the acquisition of Onavo, Facebook Israel was born.
According to TechCrunch, there’s no official figure attached to the deal, but Israeli paper Calcalist reports between $150-200 million and other sources put the figure closer to $100 million. Whether the real sum is closer to the low end or the high end of that range, it’s a massive amount of money for Onavo, which started three years ago and has previously raised around $13 million in venture funding. –www.digitaltrends.com
This purchase of Onavo and the development of the Safety APP will give Facebook increased capability of compiling one of the most extensive personal data bases in existence in the world today.
On November 11th, 2 days before the Paris attacks, Facebook published a blog report.
“This report, which covers the first half of 2015, provides information about the number of government requests we receive for data, as well as the number of pieces of content restricted for violating local law in countries around the world where we provide service. The report also includes updated information about the national security requests we received from US authorities under the Foreign Intelligence Surveillance Act and through National Security Letters.
Overall, we continue to see an increase in content restrictions and government requests for data globally. The amount of content restricted for violating local law increased by 112% over the second half of 2014, to 20,568 pieces of content, up from 9,707. Government requests for account data increased across all countries by 18% over the same period, from 35,051 requests to 41,214″
The full report is here. This is a deliberate policy of obscurantism by Facebook. When one reads their data policy it is obvious that there are no restraints on information sharing. Their figures cannot truthfully reflect the number of Government requests in France that would have spiked, following Charlie Hebdo and even if they do, out of a claimed 2,500+ Government requests for information, only a meagre 295 were “restricted” with very little explanation of what “restricted” actually means.
“We restricted access in France to content reported under local laws prohibiting Holocaust denial and the condoning of terrorism.”
This statement is rendered portentous by the wave of arrests and house searches sweeping France before the blood is even dry on the streets of Paris and certainly prior to the conducting of a full and objective investigation into the perpetrators of the “greatest atrocity committed on French soil since WWII.” This, according to media pundits reporting from Paris as the propaganda wagon rolls smoothly into its habitual groove.
It must be noted that this deliberately emotive media claim is an insult to the 200+ Algerians massacred by Paris police, during protests against France’s brutal neocolonialist war in Algeria, on the streets of Paris in 1961. Colonialist selective memory fails to honour the ghosts of these oppressed and marginalised souls, forbidden from protesting the genocide of their people and punished for daring to stand in solidarity with Algerian resistance against French hegemony. Paris police dumped the murdered bodies into the cold waters of the Seine, over 11,500 Algerians were arrested, beaten, starved and later tortured in the Palais des Sports.
The 13/11 Paris attacks with all the accompanying media frenzy will surely lead us further down the path to the implementation of Patriot Act equivalents in Europe.
As Patrick Henningsen states in his recent 21st Century Wire article: Orwell’s Razor: All of 21Wire’s predictions come true days after “Paris Attacks”
“Debate on Govt Spying and Privacy Rights, now off the table. As expected, politicians looking to appear ‘tough on terror’ and the growing gaggle of security lobbyists, and other assorted corporate fascists, have called for something akin to a ‘European Patriot Act’ – an end to the ‘Post-Snowden’ debate over bulk data collection and privacy – covering issues like NSA and GCHQ blanket spying on all citizens, and imposing more regulations and government monitoring of mandatory manufacturer ‘back doors’ for computers, mobile phones, gaming consoles, and also calls to make encryption illegal, except for government.”
“Special” police forces in St Denis, Paris 18/11/2015
CIA & Intelligence Connections
We must also take into consideration the worrying Cyber security developments in the UK:
Lord Mendelsohn: We welcome the appointment of the former British ambassador to Israel, Matthew Gould, who will have a key role in cyber security inside the Cabinet Office – a very useful and important position – Look Who’s in Charge of UK Government Cyber Security.
Matthew Gould, self proclaimed “passionate Zionist”, first Jewish British Ambassador in Tel Aviv and co creator of the controversial UK Israel Tech-Hub which was established to:
“Promote partnerships in technology and innovation between Israel and the UK, and is the first initiative of its kind for the British government and for an embassy in Israel. The hub’s creation followed an agreement between prime ministers David Cameron and Binyamin Netanyahu to build a UK-Israel partnership in technology.”
For full details on this burgeoning UK-Israel cyber marriage, read this excellent piece by Stuart Littlewood.
Now lets add a little more spice into the evolving narrative.
Included on the panel of the “Shared 21st Century International Mission” were:
CIA Director John Brennan, former UK MI6 Chief John Sawers, Director of the French Directorate for External Security Bernard Bajolet, and former Israeli National Security Advisor Yaacov Amidror
Perhaps even more concerning is the subliminal message that can be interpreted from DGSE Director, Bernard Bajolet’s remarks, endorsed by CIA Director John Brennan.
“The Middle East will never go back to how it was. Syria and Iraq will never retrieve their pre-existing features and culture
Syria is already “partitioned”. The Syrian regime only controls a tiny part, perhaps less than one third of the country established post WWII.
The North is under Kurdish control and “we” have the central region under ISIS control [I have deliberately translated the French exactly as it was written]
The situation in Iraq is the same.”
John Brennan:
“When I look at the devastation in Syria, Iraq, Libya, Yemen it is hard to envisage a central government that would be capable of controlling and governing these post WWII territories.
It appears that the partitioning plan for the Middle East is resisting all efforts to reduce its holy grail status. The partitioning plan that best serves the Israeli Yinon plan for Greater Israel and ensures permanent sectarian strife and division in countries bursting at the seams with economic, resource and geopolitical jewels for the Imperialist crown.
The timing of this conference, a mere two weeks prior to the 13/11 Paris attacks that would almost certainly propel France and allies towards increased intervention in Syria & ensure revived calls for a No Fly Zone, must be considered a little more than purely coincidental.
Conclusions
While we must stress that no concrete conclusions may be drawn at this stage, previous Gladio operations, and we would include Charlie Hebdo in that list, lead us to see very clear parallels emerging between the events surrounding Paris 13/11 and those preceding other such attacks.
The omnipresence of the Israeli Intelligence apparatus in its many forms should, at least, motivate us to suspect foul play and to question the white noise mainstream media accounts. The tsunami of propaganda, the conversion of all icons to a French flag, even including Skype heart emoticons, must ring alarm bells.
Experience teaches us that, propaganda is intrinsically linked to government agendas and that terror attacks invariably engender an increase in global oppression, conflict, sectarian division and the suffering of the very peoples universally judged and condemned by scraps of evidence that bear no resemblance to the truth.
As Sayed Nasrallah has said we are living in the age predicted by George Orwell and Aldous Huxley, the propaganda serves to ensure our rapid descent through the layers of social conditioning, from regionalism to individualism, a state of mind where there is potential for the fabric of society to be shredded and scattered into the winds of the brewing “perfect storm”
“A really efficient totalitarian state would be one in which the all-powerful executive of political bosses and their army of managers control a population of slaves who do not have to be coerced, because they love their servitude.” – Aldous Huxley, Brave New World
St Denis, Paris 18/11/2015.
Police forces operate in Saint-Denis on Wednesday, November 18. Police say two suspects in last week’s Paris attacks, a man and a woman, have been killed in a police operation north of the capital.
A fictional “scenario” of multiple bomb attacks on London’s underground took place at exactly the same time as the bomb attack on July 7, 2005.
Peter Power, Managing Director of Visor Consultants, a private firm on contract to the London Metropolitan Police, described in a BBC interview how he had organized and conducted the anti-terror drill, on behalf of an unnamed business client.
The fictional scenario was based on simultaneous bombs going off at exactly the same time at the underground stations where the real attacks were occurring:
POWER: At half past nine this morning we were actually running an exercise for a company of over a thousand people in London based on simultaneous bombs going off precisely at the railway stations where it happened this morning, so I still have the hairs on the back of my neck standing up right now.
HOST: To get this quite straight, you were running an exercise to see how you would cope with this and it happened while you were running the exercise?
POWER: Precisely, and it was about half past nine this morning, we planned this for a company and for obvious reasons I don’t want to reveal their name but they’re listening and they’ll know it. And we had a room full of crisis managers for the first time they’d met and so within five minutes we made a pretty rapid decision that this is the real one and so we went through the correct drills of activating crisis management procedures to jump from slow time to quick time thinking and so on.
(BBC Radio Interview, 7 July 2005)
In response to the flood of incoming email messages, Peter Power –who is a former senior Scotland Yard official specializing in counterterrorism– responded in the form of the following “automatic reply”:
“Thank you for your message. Given the volume of emails about events on 7 July and a commonly expressed misguided belief that our exercise revealed prescient behaviour, or was somehow a conspiracy (noting that several websites interpreted our work that day in an inaccurate / naive / ignorant / hostile manner) it has been decided to issue a single email response as follows:
It is confirmed that a short number of ‘walk through’ scenarios planed [sic] well in advance had commenced that morning for a private company in London (as part of a wider project that remains confidential) and that two scenarios related directly to terrorist bombs at the same time as the ones that actually detonated with such tragic results. One scenario in particular, was very similar to real time events.
However, anyone with knowledge about such ongoing threats to our capital city will be aware that (a) the emergency services have already practiced several of their own exercises based on bombs in the underground system (also reported by the main news channels) and (b) a few months ago the BBC broadcast a similar documentary on the same theme, although with much worse consequences [??]. It is hardly surprising therefore, that we chose a feasible scenario – but the timing and script was nonetheless, a little disconcerting.
In short, our exercise (which involved just a few people as crisis managers actually responding to a simulated series of activities involving, on paper, 1000 staff) quickly became the real thing and the players that morning responded very well indeed to the sudden reality of events.
Beyond this no further comment will be made and based on the extraordinary number of messages from ill informed people, no replies will henceforth be given to anyone unable to demonstrate a bona fide reason for asking (e.g. accredited journalist / academic).
There was nothing “routine” in the so-called “walk through” scenarios. Visor’s mock terror drills (held on the very same day as the real attack) was by no means an isolated “coincidence”. Power’s email response suggests that mock drills are undertaken very frequently, as a matter of routine, and that there was nothing particularly out of the ordinary in the exercise conducted on July 7th, which just so happened to coincide with the real terror attacks.
There have indeed been several documented high profile cases of mock terror drills in the US and the UK, held prioror on exactly the same day and at the same time as the actual terror event. In the three previous cases reviewed below, the mock drills bear a canny resemblance to the real time terror attacks.
1. CIA Sponsored Exercise on the Morning of 9/11
On the morning of September 11 2001, within minutes of the attack on the World Trade Center and the Pentagon, the CIA had been running “a pre-planned simulation to explore the emergency response issues that would be created if a plane were to strike a building”. The simulation was held at the CIA Chantilly Virginia Reconnaissance Office.
The Bush administration described the event as “a bizarre coincidence”. The matter was not mentioned by the media.(AP, 22 August 2002)
The CIA sponsored simulation consisted in a “scheduled exercise” held on the morning of September 11, 2001, where “a small corporate jet crashed into one of the four towers at the agency’s headquarters building after experiencing a mechanical failure.” (Quoted in Associated Press, 22 August 2002.)
The news concerning the 9/11 Chantilly aircraft crashing simulation was hushed up. It was not made public at the time. It was revealed almost a year later, in the form of an innocuous announcement of a Homeland Security Conference. The latter entitled “Homeland Security: America’s Leadership Challenge” was held in Chicago on September 6, 2002, barely a few days before the commemoration of the tragic events of 9/11.
The promotional literature for the conference under the auspices of the National Law Enforcement and Security Institute (NLESI) stated what nobody in America knew about. On the morning of 9/11, the CIA was conducting a pre-planned simulation of a plane striking a building. One of the key speakers at the National Law Enforcement and Security Institute conference was CIA’s John Fulton, Chief of the Strategic War Gaming Division of the National Reconnaissance Office a specialist in risk and threat response analysis, scenario gaming, and strategic planning.
On the morning of September 11th 2001, Mr. Fulton and his team at the CIA were running a pre-planned simulation to explore the emergency response issues that would be created if a plane were to strike a building. Little did they know that the scenario would come true in a dramatic way that day. Information is the most powerful tool available in the homeland security effort. At the core of every initiative currently underway to protect our country and its citizens is the challenge of getting the right information to the right people at the right time. How can so much information from around the world be captured and processed in meaningful and timely ways? Mr. Fulton shares his insights into the intelligence community, and shares a vision of how today’s information systems will be developed into even better counter-terrorism tools of tomorrow. (Ibid)
2. October 2000 Mock Terror Attack on the Pentagon
In late October 2000 (more than ten months prior to 9/11), a military exercise was conducted which consisted in establishing the scenario of a simulated passenger plane crashing into the Pentagon. The Defense Protective Services Police and the Pentagon’s Command Emergency Response Team coordinated the exercise. According to a detailed report by Dennis Ryan of Fort Myer Military Community’s Pentagram, “the Pentagon Mass Casualty Exercise, as the crash was called, was just one of several scenarios that emergency response teams were exposed to on Oct. 24-26 [2000]“:
The fire and smoke from the downed passenger aircraft billows from the Pentagon courtyard. Defense Protective Services Police seal the crash sight. Army medics, nurses and doctors scramble to organize aid. (…) Don Abbott, of Command Emergency Response Training, walks over to the Pentagon and extinguishes the flames. The Pentagon was a model and the “plane crash” was a simulated one.
On Oct. 24, there was a mock terrorist incident at the Pentagon Metro stop and a construction accident to name just some of the scenarios that were practiced to better prepare local agencies for real incidents.
(Dennis Ryan, “Contingency planning, Pentagon MASCAL exercise simulates scenarios in preparing for emergencies”, MDW NEWS 3 Nov 2000.)
3. Britain’s Atlantic Blue, April 2005
In Britain, there were several documented exercises of terror attacks on London’s underground system.
In addition to the 7/7 exercise conducted by Visor Consultants, a similar mock terror drill on London’s transportation system entitled “Atlantic Blue” was held in April 2005, barely three months prior to the real attacks. In 2003, a mock terror drill labelled OSIRIS 2 was conducted. It consisted, according to Peter Power in testing the “equipment and people deep in the Underground of London”. It involved the participation of several hundred people. (Interview with Peter Power, CTV, 11 July 2005).
“Atlantic Blue” was part of a much larger US sponsored emergency preparedness exercise labelled TOPOFF 3, which included the participation of Britain and Canada. It had been ordered by the UK Secretary of State for the Home Department, Mr. Charles Clarke, in close coordination with his US counterpart Michael Chertoff.
The assumptions of the Visor Consultants mock drill conducted on the morning of July 7th were similar to those conducted under “Atlantic Blue”. This should come as no surprise since Visor Consultants was involved, on contract to the British government, in the organisation and conduct of Atlantic Blue and in coordination with the US Department of Homeland Security.
As in the case of the 9/11 simulation organized by the CIA, the July 7, 2005 Visor mock terror drill, was casually dismissed by the media, without further investigation, as a mere “coincidence”, with no relationship to the real event.
Foreknowledge of the 7/7 Attack?
According to a report of the Associated Press correspondent in Jerusalem, the Israeli embassy in London had been advised in advance by Scotland Yard of an impending bomb attack:
Just before the blasts, Scotland Yard called the security officer at the Israeli Embassy to say they had received warnings of possible attacks, the official said. He did not say whether British police made any link to the economic conference.(AP, 7 July 2005)
Israeli Finance Minister Benjamin Netanyahu was warned by his embassy not to attend an attend an economic conference organized by the Tel Aviv Stock Exchange (TASE) in collaboration with the Israeli embassy and Deutsche Bank.
Netanyahu was staying at the Aldridge Hotel in Mayfair. The conference venue was a few miles away at the Great Eastern Hotel close to the Liverpool subway station, where one of the bomb blasts occurred.
Rudolph Giuliani’s London Visit
Rudolph Giuliani, who was mayor of New York City at the time of the 9/11 attacks, was staying at the Great Eastern hotel on the 7th of July, where TASE was hosting its economic conference, with Israel’s Finance Minister Benjamin Netanyahu as keynote speaker.
Giuliani was having a business breakfast meeting in his room at the Great Eastern Hotel, close to Liverpool Street station when the bombs went off:
“I didn’t hear the Liverpool Street bomb go off,” he explains. “One of my security people came into the room and informed me that there had been an explosion. We went outside and they pointed in the direction of where they thought the incident had happened. There was no panic. I went back in to my breakfast. At that stage, the information coming in to us was very ambiguous.” (quoted in the Evening Standard, 11 July 2005.)
Israeli Finance Minister Benjamin Netanyahu and Rudolph Giuliani knew each other. Giuliani had officially welcomed Netanyahu when he visited New York City as Prime Minister of Israel in 1996. There was no indication, however, from news reports that the two men met in London at the Great Eastern. On the day prior to the London attacks, July 6th, Giuliani was in North Yorkshire at a meeting.
After completing his term as mayor of New York City, Rudi Giuliani established a security outfit: Giuliani Security and Safety. The latter is a subsidary of Giuliani Partners LLC. headed by former New York head of the FBI, Pasquale D’Amuro.
After 9/11, D’Amuro was appointed Inspector in Charge of the FBI’s investigation of 9/11. He later served as Assistant Director of the Counterterrorism Division at FBI Headquarters and, Executive Assistant Director for Counterterrorism and Counterintelligence. D’Amuro had close links to the Neocons in the Bush adminstration.
It is worth noting that Visor Consultants and Giuliani Security and Safety LLC specialize in similar “mock terror drills” and “emergency preparedness” procedures. Both Giuliani and Power were in London at the same time within a short distance of one of the bombing sites. While there is no evidence that Giuliani and Power met in London, the two companies have had prior business contacts in the area of emergency preparedness. Peter Power served on the Advisory Board to the Canadian Centre for Emergency Preparedness (CCEP), together with Richard Sheirer, Senior Vice President of Giuliani and Partners. who was previously Commissioner at the NYC Office of Emergency Management, and Director of New York City Homeland Security. (See CCEP)
Concluding Remarks
One should not at this stage of the investigation draw hasty conclusions regarding the mock terror drill of a terror attack on the London underground, held on the same day and at the same time as the real time attacks.
The issue cannot, however, be dismissed. One would expect that it be addressed in a serious and professional fashion by the police investigation and that the matter be the object of a formal clarification by the British authorities.
The issue of foreknowledge raised in the Associated Press report also requires investigation.
More generally, an independent public inquiry into the London bomb attacks is required.
… Since the Charlie Hebdo attacks in January, from which 16 people died, Paris-area ambulance crews and emergency personnel have taken part in regular exercises designed to test their readiness for possible attacks. One such exercise was held on Friday morning, the day of the latest terror attacks. In a twist of fate, the simulated emergency was a mass shooting, according to Dr. Mathieu Raux, emergency room chief at the Pitié-Salpetrière hospital in Paris. … Full article
On November 4, the Wall Street Journal headlined “US, Allies to Boost Aid to Syria Rebels” – aka ISIS and other takfiri terrorists, US proxy foot soldiers, imperial death squads, no so-called “moderates” among them.
The Journal stopped short of explaining it, instead saying “(s)hipments of arms (and) supplies are aimed at pressuring Assad while countering Russia (and) Iran.”
Longstanding US plans call for regime change in Syria, eliminating its independent government, replacing it with one Washington and Israel control, raping the country, balkanizing it, and exploiting its people – at the same time, creating endless violence, instability and chaos like what’s happening in Afghanistan, Iraq, Libya and virtually everywhere America shows up, the greatest menace to peace in world history.
According to the Journal, increased weapons shipments to anti-Assad elements aim to “challenge the intervention of Russia and Iran on behalf of Syrian President Bashar al-Assad, US officials and their counterparts (from Saudi Arabia, Qatar and other Gulf States) in the region said.
Obama declared proxy war on Russia after pledging to avoid it. He’s playing with fire. Putin is determined to eliminate the scourge of terrorism in Syria, and by implication perhaps regionally and beyond. That puts him on a collision course with Washington, wanting its proxy death squads protected and used destructively.
The more heavily armed ISIS and other takfiris become, the harder Russian aircraft will likely target them. Expect the battle to liberate Syria to continue for as long as it takes to achieve.
According to the Journal, “(i)n the past month of intensifying Russian airstrikes, the CIA and its partners have increased the flow of military supplies to rebels in northern Syria, including of US-made TOW antitank missiles, these officials said.”
“Those supplies will continue to increase in coming weeks, replenishing stocks depleted by the regime’s expanded military offensive. An Obama administration official said the military pressure is needed to push Mr. Assad from power.”
Shoulder-launched, man-portable, surface-to-air missiles (SAMS) defense systems (Manpads) are being supplied. “Those weapons could help target regime aircraft… and could also help keep Russian air power at bay,” said the Journal, citing unnamed US officials.
Manpads are relatively inexpensive, easy to operate and able to down low-flying aircraft. Helicopters are most vulnerable. So are fixed-wing planes during takeoffs, landings, and when operating at low altitudes.
Military aircraft systems alert pilots when missiles target them. Countermeasures to avoid being struck include evasive action, infrared flares and lasers.
Russian planes are safe at high altitudes. Special precautions are taken to protect them during takeoffs and landings.
So far, Putin outwitted Obama in Syria, effectively challenging his dirty game. He’s determined to eliminate the scourge of terrorism and keep it from spreading, especially to Central Asia and Russia.
He supports Syrian sovereignty, strongly against letting outside powers determine its fate, for its own citizens alone to decide, free from foreign interference.
On September 30, the die was cast when he intervened, a righteous mission fully in accord with international law – polar opposite US aggression throughout the region and beyond.
Obama didn’t wage war on Syria to quit. Putin didn’t intervene responsibly to back off in the face of US pressure, threats and anti-Russian propaganda. Expect him to stay the course with plenty of effective military muscle – impressive enough to make Pentagon commanders leery about challenging him.
A proxy state of war between America and Russia now exists – a hugely dangerous situation, risking possible direct confrontation between the world’s two nuclear superpowers.
Expect Putin to go all-out to avoid it. Put nothing past neocon lunatics in Washington – willing to risk destroying planet earth to own it.
Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net. His new book as editor and contributor is titled “Flashpoint in Ukraine: US Drive for Hegemony Risks WW III.”
Like millions of Americans, this past week I was sitting on my couch, drinking a cold beer, watching Game 1 of the World Series – professional baseball’s hallowed championship. Suddenly the satellite feed went out, the screen went dark. Naturally, as FOX Sports scrambled to get their live feed fixed, many of my fellow Americans took to twitter to speculate as to what had caused the outage. I was, sadly, unsurprised to see that the most common joke people were making was that China must have hacked the World Series.
On the one hand, it is understandable given the barrage of propaganda about Chinese hackers as a threat to corporate and national security; seemingly every week there is a new news item highlighting the great red cyber-menace. On the other hand, it is a perfect illustration of the hypocrisy and ignorant arrogance of Americans who, despite being citizens of unquestionably the most aggressive nation when it comes to both cyber espionage and surveillance, see fit to cast China as the real villain. It is a testament to the power of both propaganda and imperial triumphalism that a proposition so disconnected from reality, and bordering on Orwellian Doublethink, is not only accepted, but is ipso facto true.
But there is a deeper political and sociological phenomenon at play here, one that begs further exploration. How is it that despite all the revelations of Edward Snowden regarding US intelligence and military snooping capabilities across the globe, Americans still cannot accept the culpability of their own government and corporate interests – the two work hand in hand – in global cyber-espionage? Even if they explicitly or implicitly know about the NSA, CIA, DIA, and Pentagon programs (among many others), their instinctive reaction is to blame China. Why? The answer lies in the complexity and effectiveness of the anti-China propaganda.
In his landmark book Public Opinion, the renowned writer, commentator, and theoretician of propaganda, Walter Lipmann, defined the term “stereotype” in the modern psychological sense as a “distorted picture or image in a person’s mind, not based on personal experience, but derived culturally.” In other words, the stereotype is an image in our mind’s eye, one that is constructed by outside forces; it is information filtered through a particular societal or cultural framework that then creates a picture of how something is to be understood. Lipmann went further, noting that carefully constructed propaganda could be used to shape stereotypes, thereby allowing the powers that be the ability to construct and manipulate information and narratives.
And this is precisely the phenomenon at work here. By repeating it endlessly, the US political and corporate media establishment have successfully convinced Americans that China is the real threat when it comes to cyberspace, playing on the stereotype of Chinese people in general, and the People’s Republic of China specifically. But, I would argue something far different: rather than seeing China as a threat, perhaps Americans, and westerners generally, should shine a light on what their own countries are doing, thereby gaining a broader perspective on the issue. For China’s moves in this field pale in comparison to those of the US, and are clearly a response to them.
China and the US: Comparing the Rap Sheets
The corporate media is replete with stories of Chinese hacking of US institutions. From alleged Chinese hacking of the University of Virginia employees connected with US government programs directed at China, to the infamous breach of the federal government’s Office of Personnel Management which resulted in the theft of the personal information of more than 20 million Americans, such stories help to construct an image of China as the world’s leading hacker-state. This week it is Chinese hackers targeting health care providers, last year it was stealing the secrets of Westinghouse and US Steel, and literally dozens of other such examples.
The purpose of this article is not to deny the veracity of these reports; I’m not a computer expert, nor do I have access to the information that an expert would need in making a determination. Instead, my purpose here is to show the grossly unbalanced, and utterly dishonest, way in which the issue is presented to Americans especially, and to probe why that might be. For any fair and balanced approach to the issue would present the simple fact that the US is the world leader in cyber-warfare, having actually conducted what are to date the only recorded live uses of cyberweapons.
Take for instance the joint US-Israel developed Stuxnet virus, a pair of highly complex and severely destructive, computer viruses launched at Iran’s nuclear facilities. According to a group of independent legal experts assembled at the request of NATO’s Cooperative Cyber Defense Center of Excellence, the Stuxnet cyberattack was “an act of force.” Their report noted that “Acts that kill or injure persons or destroy or damage objects are unambiguously uses of force [and likely violate international law].”
Indeed, the US and its Israeli partners launched the very first true cyberweapon. As cyber security expert Ralph Langer wrote in Foreign Policy in 2013:
Stuxnet is not really one weapon, but two. The vast majority of the attention has been paid to Stuxnet’s smaller and simpler attack routine — the one that changes the speeds of the rotors in a centrifuge, which is used to enrich uranium. But the second and “forgotten” routine is about an order of magnitude more complex and stealthy. It qualifies as a nightmare for those who understand industrial control system security… The “original” payload… attempted to overpressurize Natanz’s centrifuges by sabotaging the system meant to keep the cascades of centrifuges safe.
Essentially, the US and Israel employed the world’s first cyberweapon without even fully knowing the potentially destructive consequences. As the virus migrated out of the Iranian nuclear facility at Natanz and onto the internet, innumerable variables could have come into play, with the potential for disastrous outcomes.
But of course Stuxnet was not alone. The US and Israel also deployed both the Gauss and Flame viruses, two more sophisticated cyberweapons designed to cause major damage to online infrastructure. The Gauss virus, discovered by Kaspersky labs, one of the world’s most highly respected cyber-security firms, was designed to steal sensitive data such as financial records. According to the US officials who spoke with the Washington Post, the Flame virus was a: massive piece of malware [which] secretly mapped and monitored Iran’s computer networks, sending back a steady stream of intelligence to prepare for a cyberwarfare campaign… “This is about preparing the battlefield for another type of covert action… Cyber-collection against the Iranian program is way further down the road than this.” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today.
Clearly the US and Israel were not merely interested in surveillance and information-gathering, but actually having the ability to manipulate and destroy vital computer infrastructure in Iran. Any reasonable reading of international law should hold that such actions are, in fact, an act of war, though of course war with Iran has not come to pass. But just the very use of such sophisticated weapons, far more elaborate, technical, and dangerous than mere hacking by humans, should call into question the weepy-eyed condemnations of China for its alleged stealing of corporate and government information.
And then of course there is the seemingly endless supply of revelations from Edward Snowden regarding the US surveillance infrastructure, how all-encompassing it truly is, how it is used to manipulate political outcomes, how it is used as a weapon against foreign governments, and much more.
Just to name a few of the countless programs and initiatives of the NSA and the surveillance state designed to capture information for political purposes:
PRISM – allows “The National Security Agency and the FBI [to tap] directly into the central servers of nine leading U.S. internet companies, extracting audio and video chats, photographs, emails, documents, and connection logs.”
BLARNEY – “Gathers up metadata from choke points along the backbone of the internet as part of an ongoing collection program the leverages IC (intelligence community) and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”
Boundless Informant – “Details and even maps by country the voluminous amount of information it collects from computer and telephone networks.”
US & UK Target G20 Leaders – “The documents suggest that the operation was sanctioned in principle at a senior level in the government.”
US Spied on EU Offices – “America’s National Security Agency (NSA) not only conducted online surveillance of European citizens, but also appears to have specifically targeted buildings housing European Union institutions… in addition to installing bugs in the building in downtown Washington, DC, the European Union representation’s computer network was also infiltrated.”
But of course, the US has also specifically, and successfully, trained its cyber-espionage and cyber-warfare sights on China itself. Thanks to Snowden, we now know that US intelligence repeatedly hacked into Beijing’s Tsinghua University, China’s top education and research institute. As revealed in the South China Morning Post:
The information also showed that the attacks on Tsinghua University were intensive and concerted efforts. In one single day of January, at least 63 computers and servers in Tsinghua University have been hacked by the NSA… The university is home to one of the mainland’s six major backbone networks, the China Education and Research Network (CERNET) from where internet data from millions of Chinese citizens could be mined. The network was the country’s first internet backbone network and has evolved into the world’s largest national research hub.
But it wasn’t only Tsinghua University that was targeted. Snowden also revealed that Chinese University in Hong Kong was the victim of US hacking; the university is home to the Hong Kong Internet Exchange, the city’s central hub for all internet traffic. In addition, it came out that US intelligence has repeatedly hacked into Chinese mobile phone companies, spied on users, and stolen data, including text messages. These are, of course, only what we know about thus far from the Snowden revelations. The scope of US hacking operations against China is not known, but could be safely assumed to be far-reaching.
In fact, the depth of US hacking and other intelligence operations targeting China, including those taking place inside China itself, has been alluded to repeatedly. The New York Times noted in August 2015 that the Obama administration was cautious about any retaliation against China for the breach of the Office of Personnel Management because “Intelligence officials say that any legal case could result in exposing American intelligence operations inside China — including the placement of thousands of implants in Chinese computer networks to warn of impending attacks.”
It is clear that what we do know about US cyberwar programs and tactics is really only the tip of the iceberg. It is likely that Washington has myriad other China-specific hacking programs and initiatives, including the much discussed attempts to subvert the oft referenced “Great Firewall of China.” Put simply, the US is engaged in the most sophisticated forms of hacking and cyber-subversion, and much of it is directed at China (and Russia and Iran). This should now be beyond question.
Keep this information in mind the next time another story about Chinese hackers attacking US interests runs in the corporate media. While the hack may or may not be true, it is the context within which such actions take place that really needs to be understood.
There is a cyberwar going on, of this there can be no doubt. But who’s got the biggest guns? And who fired the first shot?
Government officials who pushed the Iraq War in 2002-2003 are fond of claiming that they were simply deceived by “bad intelligence,” but the process was not that simple. In reality, there was a mutually reinforcing scheme to flood the U.S. intelligence community with false data and then to pressure the analysts not to show professional skepticism.
In other words, in the capital of the most powerful nation on earth, a system had evolved that was immune to the normal rules of evidence and respect for reality. Propaganda had become the name of the game, a dangerous process that remains in force to this day.
Regarding the Iraq War case, one of the principal culprits fueling this disinformation machine was Iraqi exile Ahmed Chalabi, who died on Nov. 3 at the age of 71 from a heart attack. Chalabi, head of the U.S./neocon-backed Iraqi National Congress (INC), not only pumped intentionally false data into this process but later congratulated his organization as “heroes in error” for rationalizing the invasion of Iraq.
The INC’s principal tactic was to deluge the U.S. intelligence community – and the mainstream media – with “defectors” who provided lurid accounts of the Iraqi government hiding WMD caches and concealing its ties to Al Qaeda terrorists. Because of the welcoming climate for these lies – which were trumpeted by neoconservatives and other influential Washington operatives – there was little or no pushback.
Only after the U.S. invasion and the failure to discover the alleged WMD stockpiles did the U.S. intelligence community reconstruct how the INC’s deceptions had worked. As the CIA and the Senate Intelligence Committee belatedly discovered, some “defectors” had been coached by the INC, which was fabricating a casus belli against Iraq.
In 2006, the Senate Intelligence Committee released a little-noticed study on the role of phony “defectors.” The report revealed not only specific cases of coached Iraqi “defectors” lying to intelligence analysts but a stunning failure of the U.S. political/media system to challenge the lies. The intimidated U.S. intelligence process often worked like a reverse filter, letting the dross of disinformation pass through.
The Iraqi “defectors” and their stories also played into a sophisticated propaganda campaign by neocon pundits and pro-war officials who acted as intellectual shock troops to bully the few U.S. voices of skepticism. With President George W. Bush eager for war with Iraq – and Democrats in Congress fearful of being labeled “soft on terror” – the enforced “group think” led the United States to invade Iraq on March 19, 2003.
According to the Senate report, the official U.S. relationship with these Iraqi exiles dated back to 1991 after President George H.W. Bush had routed Saddam Hussein’s army from Kuwait and wanted to help Hussein’s domestic opponents.
Start of a Complicated Friendship
In May 1991, the CIA approached Ahmed Chalabi, a secular Shiite who had not lived in Iraq since 1956. Chalabi was far from a perfect opposition candidate, however. Beyond his long isolation from his homeland, Chalabi was a fugitive from bank fraud charges in Jordan. Still, in June 1992, the Iraqi exiles held an organizational meeting in Vienna, Austria, out of which came the Iraqi National Congress. Chalabi emerged as the group’s chairman and most visible spokesman.
But Chalabi soon began rubbing CIA officers the wrong way. They complained about the quality of his information, the excessive size of his security detail, his lobbying of Congress, and his resistance to working as a team player. For his part, the smooth-talking Chalabi bristled at the idea that he was a U.S. intelligence asset, preferring to see himself as an independent political leader. Nevertheless, he and his organization were not averse to accepting American money.
With U.S. financial backing, the INC waged a propaganda campaign against Hussein and arranged for “a steady stream of low-ranking walk-ins” to provide intelligence about the Iraqi military, the Senate Intelligence Committee report said.
The INC’s mix of duties – propaganda and intelligence – would create concerns within the CIA as would the issue of Chalabi’s “coziness” with the Shiite government of Iran. The CIA concluded that Chalabi was double-dealing both sides when he falsely informed Iran that the United States wanted Iran’s help in conducting anti-Hussein operations.
“Chalabi passed a fabricated message from the White House to” an Iranian intelligence officer in northern Iraq, the CIA reported. According to one CIA representative, Chalabi used National Security Council stationery for the fabricated letter, a charge that Chalabi denied.
In December 1996, Clinton administration officials decided to terminate the CIA’s relationship with the INC and Chalabi. “There was a breakdown in trust and we never wanted to have anything to do with him anymore,” CIA Director George Tenet told the Senate Intelligence Committee.
However, in 1998, with the congressional passage of the Iraq Liberation Act, the INC was again one of the exile organizations that qualified for U.S. funding. Starting in March 2000, the State Department agreed to grant an INC foundation almost $33 million for several programs, including more propaganda operations and collection of information about alleged war crimes committed by Hussein’s regime.
By March 2001, with George W. Bush in office and already focusing on Iraq, the INC was given greater leeway to pursue its projects, including an Information Collection Program. The INC’s blurred responsibilities on intelligence gathering and propaganda dissemination raised fresh concerns within the State Department. But Bush’s National Security Council intervened against State’s attempts to cut off funding.
The NSC shifted the INC operation to the control of the Defense Department, where neoconservatives wielded more influence. To little avail, CIA officials warned their counterparts at the Defense Intelligence Agency about suspicions that “the INC was penetrated by Iranian and possibly other intelligence services, and that the INC had its own agenda,” the Senate report said.
“You’ve got a real bucket full of worms with the INC and we hope you’re taking the appropriate steps,” the CIA told the DIA.
Media Hype
But the CIA’s warnings did little to stanch the flow of INC propaganda into America’s politics and media. Besides flooding the U.S. intelligence community with waves of propaganda, the INC funneled a steady stream of “defectors” to U.S. news outlets eager for anti-Hussein scoops.
The “defectors” also made the rounds of Congress where members saw a political advantage in citing the INC’s propaganda as a way to talk tough about the Middle East. In turn, conservative and neoconservative think tanks honed their reputations in Washington by staying at the cutting edge of the negative news about Hussein, with “human rights” groups ready to pile on, too, against the Iraqi dictator.
The INC’s information program served the institutional needs and biases of Official Washington. Saddam Hussein was a despised figure anyway, with no influential constituency that would challenge even the most outlandish accusations against him.
When Iraqi government officials were allowed onto American news programs, it was an opportunity for the interviewers to show their tough side, pounding the Iraqis with hostile questions and smirking at the Iraqi denials about WMDs and ties to Al Qaeda.
The rare journalist who tried to be evenhanded would have his or her professionalism questioned. An intelligence analyst who challenged the consensus view that Iraq possessed WMDs could expect to suffer career repercussions. So, it was a win-win for “investigative journalists,” macho pundits, members of Congress – and George W. Bush. A war fever was sweeping the United States and the INC was doing all it could to spread the infection.
Again and again, the INC’s “defectors” supplied primary or secondary intelligence on two key points, Iraq’s supposed rebuilding of its unconventional weapons and its alleged training of non-Iraqi terrorists. Sometimes, these “defectors” would even enter the cloistered world of U.S. intelligence with entrées provided by former U.S. government officials.
For instance, ex-CIA Director James Woolsey referred at least a couple of these Iraqi sources to the Defense Intelligence Agency. Woolsey, who was affiliated with the Center for Strategic and International Studies and other neocon think tanks, had been one of the Reagan administration’s favorite Democrats in the 1980s because he supported a hawkish foreign policy. After Bill Clinton won the White House, Woolsey parlayed his close ties to the neocons into an appointment as CIA director.
In early 1993, Clinton’s foreign policy adviser Samuel “Sandy” Berger explained to one well-placed Democratic official that Woolsey was given the CIA job because the Clinton team felt it owed a favor to the neoconservative New Republic, which had lent Clinton some cachet with the insider crowd of Washington.
Amid that more relaxed post-Cold War mood, the Clinton team viewed the CIA directorship as a kind of a patronage plum that could be handed out as a favor to campaign supporters. But new international challenges soon emerged and Woolsey proved to be an ineffective leader of the intelligence community. After two years, he was replaced.
As the 1990s wore on, the spurned Woolsey grew closer to Washington’s fast-growing neocon movement, which was openly hostile to President Clinton for his perceived softness in asserting U.S. military power, especially against Arab regimes in the Middle East.
On Jan. 26, 1998, the neocon Project for the New American Century sent a letter to Clinton urging the ouster of Saddam Hussein by force if necessary. Woolsey was one of the 18 signers. By early 2001, he also had grown close to the INC, having been hired as co-counsel to represent eight Iraqis, including INC members, who had been detained on immigration charges.
In other words, Woolsey was well-positioned to serve as a conduit for INC “defectors” trying to get their stories to U.S. officials and to the American public.
The ‘Sources’
DIA officials told the Senate Intelligence Committee that Woolsey introduced them to the first in a long line of INC “defectors” who then told the DIA about Hussein’s WMD and his supposed relationship with Islamic terrorists. For his part, Woolsey said he didn’t recall making that referral.
The debriefings of “Source One” – as he was called in the Senate Intelligence Committee report – generated more than 250 intelligence reports. Two of the reports described alleged terrorist training sites in Iraq, where Afghan, Pakistani and Palestinian nationals were allegedly taught military skills at the Salman Pak base, 20 miles south of Baghdad.
“Many Iraqis believe that Saddam Hussein had made an agreement with Usama bin Ladin in order to support his terrorist movement against the U.S.,” Source One claimed, according to the Senate report.
After the 9/11 attacks, information from Source One and other INC-connected “defectors” began surfacing in U.S. press accounts, not only in the right-wing news media, but many mainstream publications and news shows.
In an Oct. 12, 2001, column entitled “What About Iraq?” Washington Post chief foreign correspondent Jim Hoagland cited “accumulating evidence of Iraq’s role in sponsoring the development on its soil of weapons and techniques for international terrorism,” including training at Salman Pak. Hoagland’s sources included Iraqi army “defector” Sabah Khalifa Khodada and another unnamed Iraqi ex-intelligence officer in Turkey. Hoagland also criticized the CIA for not taking seriously a possible Iraqi link to 9/11.
Hoagland’s column was followed by a Page One article in The New York Times, which was headlined “Defectors Cite Iraqi Training for Terrorism.” It relied on Khodada, the second source in Turkey (who was later identified as Abu Zeinab al-Qurairy, a former senior officer in Iraq’s intelligence agency, the Mukhabarat), and a lower-ranking member of Mukhabarat.
This story described 40 to 50 Islamic militants getting training at Salman Pak at any one time, including lessons on how to hijack an airplane without weapons. There were also claims about a German scientist working on biological weapons.
In a Columbia Journalism Review retrospective on press coverage of U.S. intelligence on Iraq, writer Douglas McCollam asked Times correspondent Chris Hedges about the Times article, which he had written in coordination with a PBS Frontline documentary called “Gunning for Saddam,” with correspondent Lowell Bergman.
Explaining the difficulty of checking out defector accounts when they meshed with the interests of the U.S. government, Hedges said, “We tried to vet the defectors and we didn’t get anything out of Washington that said, ‘these guys are full of shit.’”
For his part, Bergman told CJR’s McCollam, “The people involved appeared credible and we had no way of getting into Iraq ourselves.”
The journalistic competition to break anti-Hussein scoops was building, too. Based in Paris, Hedges said he would get periodic calls from Times editors asking that he check out defector stories originating from Chalabi’s operation.
“I thought he was unreliable and corrupt, but just because someone is a sleazebag doesn’t mean he might not know something or that everything he says is wrong,” Hedges said. Hedges described Chalabi as having an “endless stable” of ready sources who could fill in American reporters on any number of Iraq-related topics.
The Salman Pak story would be one of many products from the INC’s propaganda mill that would prove influential in the run-up to the Iraq War but would be knocked down later by U.S. intelligence agencies.
According to the Senate Intelligence Committee’s post-mortem, the DIA stated in June 2006 that it found “no credible reports that non-Iraqis were trained to conduct or support transnational terrorist operations at Salman Pak after 1991.”
Explaining the origins for the bogus tales, the DIA concluded that Operation Desert Storm had brought attention to the training base at Salman Pak, so “fabricators and unestablished sources who reported hearsay or third-hand information created a large volume of human intelligence reporting. This type of reporting surged after September 2001.”
Going with the Flow
However, in the prelude to the Iraq War, U.S. intelligence agencies found it hard to resist the INC’s “defectors” when that would have meant bucking the White House and going against Washington’s conventional wisdom. Rather than take those career chances, many intelligence analysts found it easier to go with the flow.
Referring to the INC’s “Source One,” a U.S. intelligence memorandum in July 2002 hailed the information as “highly credible and includes reports on a wide range of subjects including conventional weapons facilities, denial and deception; communications security; suspected terrorist training locations; illicit trade and smuggling; Saddam’s palaces; the Iraqi prison system; and Iraqi petrochemical plants.”
Only analysts in the State Department’s Bureau of Intelligence and Research were skeptical because they felt Source One was making unfounded assumptions, especially about possible nuclear research sites.
After the invasion of Iraq, U.S. intelligence finally began to recognize the holes in Source One’s stories and spot examples of analysts extrapolating faulty conclusions from his limited first-hand knowledge.
“In early February 2004, in order to resolve … credibility issues with Source One, Intelligence Community elements brought Source One to Iraq,” the Senate Intelligence Committee report said. “When taken to the location Source One had described as the suspect [nuclear] facility, he was unable to identify it.
“According to one intelligence assessment, the ‘subject appeared stunned upon hearing that he was standing on the spot that he reported as the location of the facility, insisted that he had never been to that spot, and wanted to check a map’ …
“Intelligence Community officers confirmed that they were standing on the location he was identifying. … During questioning, Source One acknowledged contact with the INC’s Washington Director [name redacted], but denied that the Washington Director directed Source One to provide any false information. ”
The U.S. intelligence community had mixed reactions to other Iraqi “walk-ins” arranged by the INC. Some were caught in outright deceptions, such as “Source Two” who talked about Iraq supposedly building mobile biological weapons labs.
After catching Source Two in contradictions, the CIA issued a “fabrication notice” in May 2002, deeming him “a fabricator/provocateur” and asserting that he had “been coached by the Iraqi National Congress prior to his meeting with western intelligence services.”
However, the DIA never repudiated the specific reports that had been based on Source Two’s debriefings. So, Source Two continued to be cited in five CIA intelligence assessments and the pivotal National Intelligence Estimate in October 2002, “as corroborating other source reporting about a mobile biological weapons program,” the Senate Intelligence Committee report said.
Source Two was one of four human sources referred to by Secretary of State Colin Powell in his United Nations speech on Feb. 5, 2003. When asked how a “fabricator” could have been used for such an important speech, a CIA analyst who worked on Powell’s speech said, “we lost the thread of concern … as time progressed I don’t think we remembered.”
A CIA supervisor added, “Clearly we had it at one point, we understood, we had concerns about the source, but over time it started getting used again and there really was a loss of corporate awareness that we had a problem with the source.”
Flooding Defectors
Part of the challenge facing U.S. intelligence agencies was the sheer volume of “defectors” shepherded into debriefing rooms by the INC and the appeal of their information to U.S. policymakers.
“Source Five,” for instance, claimed that Osama bin Laden had traveled to Baghdad for direct meetings with Saddam Hussein. “Source Six” claimed that the Iraqi population was “excited” about the prospects of a U.S. invasion to topple Hussein. Plus, the source said Iraqis recognized the need for post-invasion U.S. control.
By early February 2003, as the final invasion plans were underway, U.S. intelligence agencies had progressed up to “Source Eighteen,” who came to epitomize what some analysts still suspected – that the INC was coaching the sources.
As the CIA tried to set up a debriefing of Source Eighteen, another Iraqi exile passed on word to the agency that an INC representative had told Source Eighteen to “deliver the act of a lifetime.” CIA analysts weren’t sure what to make of that piece of news – since Iraqi exiles frequently badmouthed each other – but the value of the warning soon became clear.
U.S. intelligence officers debriefed Source Eighteen the next day and discovered that “Source Eighteen was supposed to have a nuclear engineering background, but was unable to discuss advanced mathematics or physics and described types of ‘nuclear’ reactors that do not exist,” according to the Senate Intelligence Committee report.
“Source Eighteen used the bathroom frequently, particularly when he appeared to be flustered by a line of questioning, suddenly remembering a new piece of information upon his return. During one such incident, Source Eighteen appeared to be reviewing notes,” the report said.
Not surprisingly, the CIA and DIA case officers concluded that Source Eighteen was a fabricator. But the sludge of INC-connected misinformation and disinformation continued to ooze through the U.S. intelligence community and to foul the American intelligence product – in part because there was little pressure from above demanding strict quality controls.
Curve Ball
Other Iraqi exile sources – not directly connected to the INC – also supplied dubious information, including a source for a foreign intelligence agency who earned the code name “Curve Ball.” He contributed important details about Iraq’s alleged mobile facilities for producing agents for biological warfare.
Tyler Drumheller, former chief of the CIA’s European Division, said his office had issued repeated warnings about Curve Ball’s accounts. “Everyone in the chain of command knew exactly what was happening,” Drumheller said. [Los Angeles Times, April 2, 2005]
Despite those objections and the lack of direct U.S. contact with Curve Ball, he earned a rating as “credible” or “very credible,” and his information became a core element of the Bush administration’s case for invading Iraq. Drawings of Curve Ball’s imaginary bio-weapons labs were a central feature of Secretary of State Powell’s presentation to the U.N.
Even after the invasion, U.S. officials continued to promote these claims, portraying the discovery of a couple of trailers used for inflating artillery balloons as “the strongest evidence to date that Iraq was hiding a biological warfare program.” [CIA-DIA report, “Iraqi Mobile Biological Warfare Agent Production Plants,” May 16, 2003]
Finally, on May 26, 2004, a CIA assessment of Curve Ball said “investigations since the war in Iraq and debriefings of the key source indicate he lied about his access to a mobile BW production product.”
The U.S. intelligence community also learned that Curve Ball “had a close relative who had worked for the INC since 1992,” but the CIA could never resolve the question of whether the INC was involved in coaching Curve Ball. One CIA analyst said she doubted a direct INC role because the INC pattern was to “shop their good sources around town, but they weren’t known for sneaking people out of countries into some asylum system.”
Delayed Report
In September 2006, four years after the Bush administration seriously began fanning the flames for war against Iraq, a majority of Senate Intelligence Committee members overrode the objections of the panel’s senior Republicans and issued a report on the INC’s contribution to the U.S. intelligence failures.
The report concluded that the INC fed false information to the intelligence community to convince Washington that Iraq was flouting prohibitions on WMD production. The panel also found that the falsehoods had been “widely distributed in intelligence products prior to the war” and did influence some American perceptions of the WMD threat in Iraq.
But INC disinformation was not solely to blame for the bogus intelligence that permeated the pre-war debate. In Washington, there had been a breakdown of the normal checks and balances that American democracy has traditionally relied on for challenging and eliminating the corrosive effects of false data.
By 2002, that self-correcting mechanism – a skeptical press, congressional oversight, and tough-minded analysts – had collapsed. With very few exceptions, prominent journalists refused to put their careers at risk; intelligence professionals played along with the powers that be; Democratic leaders succumbed to the political pressure to toe the President’s line; and Republicans marched in lockstep with Bush on his way to war.
Because of this systematic failure, the Senate Intelligence Committee concluded four years later that nearly every key assessment of the U.S. intelligence community as expressed in the 2002 National Intelligence Estimate about Iraq’s WMD was wrong:
“Postwar findings do not support the [NIE] judgment that Iraq was reconstituting its nuclear weapons program; … do not support the [NIE] assessment that Iraq’s acquisition of high-strength aluminum tubes was intended for an Iraqi nuclear program; … do not support the [NIE] assessment that Iraq was ‘vigorously trying to procure uranium ore and yellowcake’ from Africa; … do not support the [NIE] assessment that ‘Iraq has biological weapons’ and that ‘all key aspects of Iraq’s offensive biological weapons program are larger and more advanced than before the Gulf war’; … do not support the [NIE] assessment that Iraq possessed, or ever developed, mobile facilities for producing biological warfare agents; … do not support the [NIE] assessments that Iraq ‘has chemical weapons’ or ‘is expanding its chemical industry to support chemical weapons production’; … do not support the [NIE] assessments that Iraq had a developmental program for an Unmanned Aerial Vehicle ‘probably intended to deliver biological agents’ or that an effort to procure U.S. mapping software ‘strongly suggests that Iraq is investigating the use of these UAVs for missions targeting the United States.’”
Today, you can see a similar process as the Obama administration relies on “strategic communications” – a mix of psy-ops, propaganda and P.R. – to advance its strategic goals of “regime change” in Syria, maintenance of an anti-Russian regime in Ukraine, and escalation of hostilities with Russia.
When pivotal events occur – like the Aug. 21, 2013 sarin gas attack outside Damascus, the Feb. 20, 2014 sniper shootings in Kiev, or the July 17, 2014 shoot-down of Malaysia Airlines Flight 17 over eastern Ukraine – the propaganda machine clicks back into gear and the incidents are used to smear U.S. “adversaries” and strengthen U.S. “friends.”
Thus, truth has become the routine casualty of “info-war.” The American people are serially deceived in the name of “national security” and manipulated toward more conflict and military spending. Over the years, this process surely put a crooked smile on the face of Ahmed Chalabi, who proved himself one of its masters.
Investigative reporter Robert Parry broke many of the Iran-Contra stories for The Associated Press and Newsweek in the 1980s. You can buy his latest book, America’s Stolen Narrative, either in print here or as an e-book (from Amazon and barnesandnoble.com).
Arabesque$: Enquête sur le rôle des États-Unis dans les révoltes arabes(Investigation into the US Role in the Arab Uprisings) is an update of Ahmed Bensaada’s 2011 book L’Arabesque Américaine. It concerns the US government role in instigating, funding and coordinating the Arab Spring “revolutions.” Obviously most of this history has been carefully suppressed by the western media.
The new book devotes much more attention to the personalities leading the 2011 uprisings. Some openly admitted to receiving CIA funding. Others had no idea because it was deliberately concealed from them. A few (in Egypt and Syria) were officially charged with espionage. In Egypt, seven sought refuge in the US embassy in Cairo and had to be evacuated by the State Department.
Democracy: America’s Biggest Export
According to Bensaada, the MENA Arab Spring revolutions have four unique features in common:
None were spontaneous – all required careful and lengthy (5+ years) planning, by the State Department, CIA pass through foundations, George Soros, and the pro-Israel lobby.1
All focused exclusively on removing reviled despots without replacing the autocratic power structure that kept them in power.
No Arab Spring protests made any reference whatsoever to powerful anti-US sentiment over Palestine and Iraq.
All the instigators of Arab Spring uprisings were middle class, well educated youth who mysteriously vanished after 2011.
Nonviolent Regime Change
Bensaada begins by introducing non-violent guru Gene Sharp (see The CIA and Nonviolence), his links with the Pentagon and US intelligence, and his role, as director of the Albert Einstein Institution, in the “color” revolutions.2 in Eastern Europe and the attempted coup against Hugo Chavez in 2002.))
The US goal in the Arab Spring revolutions was to replace unpopular despotic dictators while taking care to maintain the autocratic US-friendly infrastructure that had brought them to power. All initially followed the nonviolent precepts Sharp outlines in his 1994 book From Dictatorship to Democracy. In Libya, Syria and Yemen, the US and their allies were clearly prepared to introduce paid mercenaries when their Sharpian “revolutions” failed to produce regime change.
Follow the Money
Relying mainly on Wikileaks cables and the websites of key CIA pass through foundations (which he reproduces in the appendix), Bensaada methodically lists every State Department conference and workshop the Arab Spring heroes attended, the dollar amounts spent on them by the State Department and key “democracy” promoting foundations3, the specific involvement of Google, Facebook, Twitter and Obama’s 2008 Internet campaign team in training Arab Spring cyperactivists in encryption technologies and social media skills, US embassy visits, and direct encounters with Hillary Clinton, Condoleezza Rice, John McCain, Barack Obama and Serbian trainers from CANVAS (the CIA-backed organization that overthrew Slobodan Milosevic in 2000).
Bensaada focuses most heavily on the Tahrir Square uprising in Egypt. The Washington Post has estimated approximately 10,000 Egyptians took part in NED and USAID training in social media and nonviolent organizing techniques. For me the most astonishing information in this chapter concerned the role of an Egyptian exile (a former Egyptian policeman named Omar Afifi Suleiman) in coordinating the Tahrir Square protests from his office in Washington DC. According to Wikileaks, NED paid Suleiman a yearly stipend of $200,000+ between 2008-2011.
When Nonviolence Fails
Arabesques$ devotes far more attention to Libya, Syria and Yemen than Bensaada’s first book.
In the section on Libya, Bensaada zeroes in on eleven key US assets who engineered the overthrow of Gaddafi. Some participated in the same State Department trainings as the Middle East opposition activists and instigated nonviolent Facebook and Twitter protests to coincide with the 2011 uprisings in Tunisian and Egypt. Others, in exile, underwent guerrilla training sponsored by the CIA, Mossad, Chad and Saudi Arabia. A few months after Gaddafi’s assassination, some of these same militants would lead Islamic militias attempting to overthrow Assad in Syria.
Between 2005 and 2010, the State Department funneled $12 million to opposition groups opposed to Assad. The US also financed Syrian exiles in Britain to start an anti-government cable TV channel they beamed into Syria.
In the section on Syria, Bensaada focuses on a handful of Syrian opposition activists who received free US training in cyberactivism and nonviolent resistance beginning in 2006. One, Ausama Monajed, is featured in the 2011 film How to Start a Revolution about a visit with Gene Sharp in 2006. Monajed and others worked closely with the US embassy, funded by the Middle East Partnership Initiative (MEPI). This is a State Department program that operates in countries (such as Libya and Syria) where USAID is banned.
In February 2011, these groups posted a call on Twitter and Facebook for a Day of Rage. Nothing happened. When Sharpian techniques failed to produce a sizable nonviolent uprising, as in Libya, they and their allies (Saudi Arabia, Turkey, Qatar and Jordan) were all set up to introduce Islamic mercenaries (many directly from Libya) to declare war on the Assad regime.
I was astonished to learn that Forum Fikra, a forum for Arab activists working against authoritarian governments, was mainly funded by the Nathan and Esther K Wagner Family Foundation. The latter also funds numerous pro-Israel groups and projects, as well as the Washington Institute for Near East Policy (a pro-Israel group with close ties to AIPAC).
The color revolutions were CIA-instigated uprisings that replaced democratically elected pro-Russian governments with equally autocratic governments more friendly to US corporate interests:
Serbia (2000) – Bulldozer Revolution
Georgia (2002) – Rose Revolution
Ukraine (2004) – Orange Revolution
Kyrgyzstan (2005) – Tulip Revolution
Democracy promoting foundations (as used here, “democracy” is synonymous with capitalism, ie favorable to the interests of US investors). Here are seven of the main ones involved in funding and training Arab Spring activists:
• USAID (US Agency for International Development) – State Department agency charged with economic development and humanitarian aid with a long history of financing destabilization activities, especially in Latin America.
• NED (National Endowment for Democracy) – national organization supported by State Department and CIA funding dedicated to the promotion of democratic institutions throughout the world, primary funder of IRI and NDI.
• IRI (International Republican Institute) – democracy promoting organization linked with the Republican Party, currently chaired by Senator John McCain and funded by NED.
• NDI (National Democratic Institute for International Affairs) – democracy promoting organization linked with the Democratic Party, currently chaired by Madeline Albright and funded by NED.
• OSI (Open Society Institute) – founded by George Soros in 1993 to help fund color revolutions in Eastern Europe. Also contributed major funding to Arab Spring revolutions.
• Freedom House – US organization that supports nonviolent citizens initiatives in societies were liberty is denied or threatened, financed by USAID, NED and the Soros Foundation.
• CANVAS (Center for Applied Non Violent Action and Strategies) – center originally founded by the Serbian activists of Otpor who the US funded and trained to over throw Slobodan Milosevic and who were instrumental in training Arab Spring activists. Funded by Freedom House, IRI and George Soros
Dr. Bramhall is a retired American psychiatrist and political refugee in New Zealand. She has published a free, downloadable non-fiction ebook 21st Century Revolution. Her first book The Most Revolutionary Act: Memoir of an American Refugee describes the circumstances that led her to leave the US in 2002. Email her at: stuartbramhall@yahoo.co.nz.
People sometimes wonder why is it important to investigate the alleged hijackers and others officially accused of committing the 9/11 crimes. After all, the accused 19 hijackers could not have accomplished most of what happened. The answer is that the official accounts are important because they are part of the crimes. Identifying and examining the people who created the official 9/11 myth helps to reveal the ones who were responsible overall.
The people who actually committed the crimes of September 11th didn’t intend to just hijack planes and take down the buildings—they intended to blame others. To accomplish that plan the real criminals needed to create a false account of what happened and undoubtedly that need was considered well in advance. In this light, the official reports can be seen to provide a link between the “blaming others” part of the crimes and the physical parts.
Pushing the concept of “Islamic Terrorism” was the beginning of the effort to blame others, although the exact 9/11 plan might not have been worked out at the time. This concept was largely a conversion of the existing Soviet threat, which by 1989 was rapidly losing its ability to frighten the public, into something that would serve more current policy needs. Paul Bremer and Brian Jenkins were at the forefront of this conversion of the Soviet threat into the threat of Islamic terrorism. Both Bremer and Jenkins were also intimately connected to the events at the World Trade Center.
The concerted effort to propagandize about Al Qaeda and Osama bin Laden (OBL) seems to have begun in earnest in 1998. That’s when the African embassy bombings were attributed to OBL and the as-yet unreported group called Al Qaeda. The U.S. government responded with bombings of Sudan and Afghanistan and, with help from the New York Times, began to drum up an intense myth about the new enemy.
“This is, unfortunately, the war of the future,” Secretary of State Madeleine Albright said. “The Osama bin Laden organization has basically declared war on Americans and has made very clear that these are all Americans, anywhere.”
In retrospect, it is surprising that this was the first reference to Al Qaeda in the New York Times, coming only three years before 9/11. More surprising is that The Washington Post did not report on Al Qaeda until June 1999, and its reporting was highly speculative about the power behind this new threat.
“But for all its claims about a worldwide conspiracy to murder Americans, the government’s case is, at present, largely circumstantial. The indictment never explains how bin Laden runs al Qaeda or how he may have masterminded the embassy bombings.”
Despite this skepticism from The Post, the reports about Al Qaeda continued in an odd mixture of propaganda and doubt. For example, The Timesreported on the trial of the men accused of the African embassy attacks in May 2001. That article contradicted itself saying that “prosecutors never introduced evidence directly showing that Mr. bin Laden ordered the embassy attacks” and yet that a “former advisor” to Bin Laden, one Ali Mohamed, claimed that Bin Laden “pointed to where a truck could go as a suicide bomber.” The fact that Mohamed had worked for the U.S. Army, the FBI, and the CIA was not mentioned.
Other facts were ignored as well. That OBL had worked with the CIA and that Al Qaeda was basically a creation of CIA programs like Operation Cyclone were realities that began to fade into the background. By the time 9/11 happened, those facts were apparently forgotten by a majority of U.S. leaders and media sources. Also overlooked were the histories of people like Frank Carlucci and Richard Armitage, who played major roles in Operation Cyclone and who remained powerful players at the time of the 9/11 attacks.
In the two years before 9/11, the alleged hijackers were very active within the United States. They traveled extensively and often seemed to be making an effort to be noticed. When they were not trying to be noticed, they engaged in distinctly non-Muslim behavior. Mohamed Atta’s actions were erratic, in ways that were similar to those of Lee Harvey Oswald, and Atta appeared to be protected by U.S. authorities.
Meanwhile, leading U.S. terrorism experts seemed to be facilitating Al Qaeda terrorism. Evidence suggests that U.S. intelligence agency leaders Louis Freeh and George Tenet facilitated and covered-up acts of terrorism in the years before 9/11. Both of their agencies, the CIA and FBI, later took extraordinary measures to hide evidence related to the 9/11 attacks. And both agencies have made a mockery of the trial of those officially accused of helping OBL and the alleged hijackers.
Counter-terrorism leader Richard Clarke inexplicably helped OBL stay out of trouble, protecting him on at least two occasions. Clarke blatantly failed to follow-up on known Al Qaeda cells operating within the United States. After 9/11, Clarke was among those who falsely pointed to Abu Zubaydah as a top leader of Al Qaeda. Zubaydah’s torture testimony was then used as the basis for the 9/11 Commission Report.
Former CIA operative Porter Goss created the first official account of what happened on 9/11, along with his mentor Bob Graham. This was the report of the Joint Congressional Inquiry, produced by the intelligence oversight committees of the U.S. Congress. It was greatly influenced by people who should have been prime suspects. For example, Richard Clarke was the one in charge of the secure video conference at the White House that failed miserably to connect leaders and respond to the attacks. In the Joint Inquiry’s report, Clarke was cited as an authoritative reference 46 times. CIA director George Tenet was cited 77 times, and Louis Freeh was cited 31 times.
Therefore it is imperative that the people who worked to create the background story behind OBL and the accused hijackers be investigated for their roles in the 9/11 crimes. This includes not only those who were figureheads behind the official reports, but more importantly the ones who provided the evidence and testimony upon which those reports were built. The alleged hijackers and their associates should also be of considerable interest to 9/11 investigators. That’s because what we know about them was provided by people who we can assume were connected to the crimes and what we don’t yet know about them can reveal more of the truth.
I’m writing from Guantánamo Bay, where pre-trial proceedings in the military commissions prosecution of the 9/11 defendants have restarted after an 18-month delay. It has been a faltering start, to say the least: Within ten minutes of the first hearing, the agenda was derailed. Again.
One of the defendants, Walid Bin Attash, asked about the procedures that would allow him to represent himself because he could not trust the independence of the military commission, including his lawyers. All the parties then had to grapple with how self-representation would work in this novel context. But lurking behind these dilemmas is the real issue that has so often derailed the military commissions: the government’s use of secrecy in what it presents as a public death penalty trial.
As we have pointed out for years, the military commissions are unfair, unconstitutional, and plagued by excessive secrecy. These challenges make it extraordinarily difficult for the defense attorneys to do their job. And they make it even harder for defendants to exercise the right to represent themselves meaningfully.
There are straightforward logistical impossibilities for defendants if they attempt to represent themselves. They are held virtually incommunicado in “Camp 7” at Guantánamo, a secret prison within a secretive prison holding detainees who were tortured at the CIA’s secret black sites. Defendants cannot file motions, consult a law library, communicate with (or even learn the names of) witnesses, or compile confidential legal documents.
The defendants also face the unique challenge of representing themselves when they have been tortured by the government that seeks to kill them, continue to be subjected to a “controlled chaos strategy of changing the rules all the time” that serves to retraumatize them, and are denied rehabilitation to help them cope with the effects of their torture. Conditions at Camp 7 reportedly exacerbate the continued effects of CIA torture. Bin Attash declared at the beginning of this week’s hearings that “we are still in the black sites” before the judge, Army Col. James Pohl, cut him off.
The results of torture are quite visible at the trial: As an observer, one of the most difficult aspects of these hearings is watching the guards place a particularly frail defendant, Mustafa al-Hawsawi, each morning on a chair equipped with a special pillow. As the Senate Intelligence Committee’s torture report documents, al-Hawsawi was subjected to “rectal exams conducted with ‘excessive force’” while detained at a secret CIA prison. CIA records indicate that the result was “chronic hemorrhoids, an anal fissure, and symptomatic rectal prolapse.” He now weighs less than 100 pounds and sometimes bleeds on his clothing. His medical records, like so much else at Guantánamo, are kept secret even from his counsel.
But perhaps the single biggest obstacle to self-representation is government secrecy. Defendants in the military commissions are not permitted to see classified evidence. That’s the case even if the government tries to use it to put them to death, and even if it could help their case. How can someone defend themselves when they can’t see the evidence? This problem isn’t confined to the self-representation context; even security-cleared defense counsel at Guantánamo are sometimes kept in the dark about relevant evidence.
These difficulties could be left for another day, suggested the judge. Perhaps, if a defendant chooses to represent himself, the military commissions could muddle through whatever problems cropped up along the way. Maybe the most obviously unfair scenarios would never come to pass, he hypothesized. At that point, former Secretary of Defense Rumsfeld entered the frame: Are concerns about the viability of self-representation in the military commissions merely a case of “unknown unknowns”?
So many questions arise when you try to invent justice as you go along.
The government has chosen to sidestep our tried and true federal courts and created a novel death penalty court here at Guantánamo. Without a doubt, there are a great number of unknown unknowns in this unprecedented proceeding. But as counsel for Ammar al-Baluchi observed, “there are huge known unknowns.” Given the government’s repeated and acknowledged efforts to rely on secret evidence and simultaneously hide that same evidence from the accused — and the public — a wide array of problems for a defendant who seeks to represent himself are easily predictable.
As David Nevin, counsel for defendant Khalid Sheik Mohammad, has explained, secrecy is “the live wire of this case.” At some point, Nevin suggested, the court will have to decide if it wants this trial to be a “real case” or merely a fundamentally unfair exercise of government power. And whether it’s a “real case” depends in part on whether the government succeeds in hiding from the American public the details of some of the most important trials in our history.
Perhaps the moment that most perfectly encapsulated the week of hearings so far happened at the end of the second day. Defense counsel had submitted a motion containing information that the government had decided was so secret that special permission was required to read it. But the government had not cleared the judge himself to know the information. After consulting with the court security officer, the judge refused to accept the defense’s submission.
“It’s hard for me to know what it is without knowing what it is,” he said. The same could be said for the military commission itself.
By Kurt Nimmo | Another Day in the Empire | April 20, 2026
In 2025, Alex Karp, the CEO of government and military tech contractor Palantir, published The New York Times best-seller, The Technological Republic: Hard Power, Soft Belief, and the Future of the West. The Wall Street Journalpraised the book as a cri de coeur, a passionate appeal “that takes aim at the tech industry for abandoning its history of helping America and its allies,” while Wired praised the book as a “readable polemic that skewers Silicon Valley for insufficient patriotism.”
On April 18, 2026, Palantir posted twenty-two points to social media summarizing the book. In addition to taking Silicon Valley to task for insufficient patriotism, advocating a role for AI in forever war, and denouncing the “psychologization of modern politics,” the Palantir post on X declares: “National service should be a universal duty. We should, as a society, seriously consider moving away from an all-volunteer force and only fight the next war if everyone shares in the risk and the cost.”
National conscription, a form of involuntary servitude, and the wars it portends, is good for business, especially for corporations within the orbit of the Pentagon, the CIA, and the national security state. Palantir fits comfortably within this amalgamation. … continue
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.