Aletho News

ΑΛΗΘΩΣ

The Illusion of Israeli Self Sufficiency in Intelligence

By José Niño | The Libertarian Institute | August 26, 2025

Casual onlookers salivate at the supposed brilliance of Israel’s intelligence services. From Mossad’s assassinations abroad to daring sabotage campaigns in hostile territory, the Jewish state has been elevated in popular imagination as a scrappy David with unmatched cunning, capable of pulling off operations that leave even world powers like the United States in awe. Books, films, and mainstream pundits reinforce this myth, presenting Israel’s intelligence machine as self-sufficient and independent.

But when one peels back the layers, the narrative quickly unravels. Israel’s most celebrated operations—from targeted killings in Europe to sabotage inside Iran—were rarely the product of Israeli ingenuity alone. They relied on cooperation with the CIA, NSA cyberwarfare expertise, European intelligence networks, and even covert collaboration with Arab regimes that publicly denounce Israel while privately working with it. Much like its dependence on U.S. military aid and diplomatic cover, Israel’s intelligence empire survives not through independence but through reliance on Western logistics, intelligence sharing, and political approval. What is sold as the story of a bootstrapping nation is a case study in multinational complicity.

According to investigative reporting by Israeli journalists Melman and Ronen Bergman, Israel’s intelligence community relied heavily on intelligence partnerships with Western and allied nations to conduct clandestine activities in foreign territories.

The foundation of this intelligence cooperation traces back to the aftermath of the 1972 Munich Olympics massacre. According to Dr. Aviva Guttmann’s research, which Melman has covered extensively, the Berne Club—a secret European intelligence alliance founded in 1969—provided crucial support for Israel’s subsequent assassination campaign against Palestinian operatives. This multinational intelligence network initially included Switzerland, West Germany, France, the United Kingdom, Italy, Luxembourg, Austria, the Netherlands, and Belgium, and later expanded to include the United States, Canada, Australia, and other nations. Through an encrypted communication system called Kilowatt,” thousands of cables were exchanged among eighteen Western intelligence services after the system was established in 1971. The network functioned as a secret clearinghouse for raw intelligence. Shared reports contained the locations of safe houses, vehicle registrations, the movements of high-value targets, updates on Palestinian guerrilla tactics, and analytical assessments, all of which provided Israel with crucial operational support for its clandestine operations.

Direct American involvement in Israeli operations became particularly evident during the George W. Bush administration. The February 2008 assassination of Hezbollah commander Imad Mughniyeh in Damascus was reportedly approved by President Bush himself after being briefed by then-CIA Director Michael Hayden. This was not merely intelligence sharing but active operational participation. “The Mossad agent would ID Mughniyeh, and the CIA man would press the remote control,” a Newsweek report noted. The CIA designed and built the bomb that killed Mughniyeh, tested it at a secret facility in North Carolina, and smuggled it into Syria through Jordan, while Mossad provided intelligence and logistical support.

When it came to confronting Iran’s nuclear program, the United States and Israel collaborated on the creation of the Stuxnet computer virus in a joint operation codenamed Olympic Games.” The malware was designed to sabotage centrifuges at Iran’s Natanz uranium enrichment facility. According to Ronen Bergman, the virus was developed with input from Israeli cybersecurity experts alongside the U.S. National Security Agency. This operation represented a quadrilateral effort involving the CIA, NSA, Mossad, and Israel’s military intelligence agency, AMAN. It was conceived during the administrations of W. Bush and Israeli Prime Minister Ehud Olmert and ultimately executed in 2010 under President Barack Obama and Prime Minister Benjamin Netanyahu.

The scope of American involvement extended to Israel’s broader targeted killing policies. Ronen Bergman revealed that during Ariel Sharon’s tenure, a secret deal was struck with then-U.S. National Security Advisor Condoleezza Rice that committed Israel to “significantly reduce the construction of new settlements in exchange for American backing of the war with the Palestinians and of Israel’s targeted killing policy” of high-value Palestinian figures.

American intelligence cooperation facilitated Israel’s campaign against Iran’s nuclear program, with Melman documenting extensive Western knowledge of and potential involvement in the assassination of Iranian nuclear scientists between 2007-2012. The Obama administration was aware of the assassination campaign carried out by the Mujahideen-e-Khalq (MEK) terrorist organization, which was being financed, armed, and trained by Mossad. Joint Special Operations Command (JSOC) reportedly trained MEK members starting in 2005, and U.S. intelligence was providing crucial information for these operations. As one former senior intelligence official told investigative journalist Seymour Hersh, “the United States is now providing the intelligence” for assassinations carried out “primarily by MEK through liaison with the Israelis.”

Israeli dependency on foreign support went beyond Western allies to include collaborationist elements in the Arab world. Bergman revealed extensive details about Mossad’s regional cooperation during Meir Dagan’s tenure (2002-2010) as director of the Mossad, including secret partnerships with Arab intelligence services that publicly condemned Israel while privately cooperating with it. These arrangements involved joint operations with countries that “share more or less the same set of interests” despite public hostility, coordination in counter-terrorism operations across the Middle East, and partnerships that enabled many operations attributed solely to Mossad.

The pattern of foreign dependence continues in contemporary operations. An August 2025 ProPublica report by Yossi Melman and fellow journalist Dan Raviv showcased Israel’s enlistment of Iranian dissidents for executing missions inside Iran during “Operation Rising Lion.” They specifically outlined Mossad’s strategic shift from using Israeli personnel to cultivating a “foreign legion” of Iranian and regional operatives to carry out activities ranging from support functions to covert action.

This pattern of intelligence reporting by Melman and Bergman reveals that Israel’s reputation for independent intelligence capabilities obscures a reality of extensive foreign dependence, particularly on Western intelligence services, for conducting operations that extend Israeli influence and security interests globally.

Far from being a model of independence, Israel’s intelligence record underscores how deeply its operations are embedded in Western power structures. The myths of self-sufficiency and unmatched brilliance collapse under the weight of evidence: Mossad’s reach is extended only because Washington, European capitals, and even regional neighbors provide the pipelines of intelligence, technology, and manpower that make its operations possible.

The true scandal lies not in Israel’s dependency but in the willingness of other nations to abet its destabilizing campaigns by supplying the bombs, intelligence streams, and diplomatic cover that allow Tel Aviv to operate with impunity. To strip away the mythology is to confront the uncomfortable truth that Israel’s “miraculous” intelligence victories are collective endeavors, outsourced across continents, exposing not a triumph of independence but a parasitic reliance on collaborators who enable its shadow wars.

August 26, 2025 Posted by | Deception, War Crimes | , , , , , , , , , , , , , , | 1 Comment

How the CIA Spawned Google

By Svetlana Ekimenko – Sputnik – 05.02.2025

American tech giant Google has faced regulatory scrutiny on numerous occasions amid accusations of antitrust violations. Google’s relationship with the CIA, ranging from early financial support to collaborative efforts have been decried as undermining privacy rights and free speech in the digital landscape.

Google’s creation played a crucial role in the US intelligence community’s scheme to attain global dominance by controlling information.

How it Started

  • The Pentagon founded its private sector project the Highlands Forum during the Clinton administration in 1994, according to the INSURGE INTELLIGENCE project.
  • Together with defense contractors, the group hammered out a strategy for “network-centric warfare.”
  • The 9/11 terrorist attacks were seized upon by US spy agencies to justify not only military invasions across the Muslim world, but also mass surveillance of civilian populations.

CIA Steps In

  • The CIA’s Massive Digital Data Systems (MDDS) program, which originated in the 1990s, was designed to enhance query techniques and track users’ digital footprints.
  • To better serve its goals, in 1999, the CIA established its own venture capital firm, In-Q-Tel, to invest in potentially useful technologies.
  • Ph.D. students at Stanford University, Sergey Brin and Larry Page, were working on precisely such a tech start-up.
  • The design of the search engine and algorithms that ultimately evolved into Google was funded by CIA grants through a program aimed at enhancing mass surveillance capabilities.

PRISM

  • Whistleblower Edward Snowden revealed in 2013 that the NSA had direct access to Google’s systems through its secret PRISM program, enabling the agency to harvest vast amounts of data on American citizens, Washington’s allies, and foreign nationals.
  • Ex-CIA spooks are employed in almost every department at Google, according to a 2022 report based on the analysis of employment websites.
  • Google has been slapped with multiple lawsuits stemming from its history of data misuse and privacy violations.

February 5, 2025 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , | Leave a comment

A Republic of Spies

By Andrew P. Napolitano | Ron Paul Institute | January 30, 2025

In 2021, to his credit, President Joe Biden warned the American public against the dangers of zero-click spyware manufactured by an Israeli corporation. Zero-click is unwanted software that can expose the entire contents of one’s mobile or desktop device to prying eyes without tricking one into clicking on to a link. Biden banned its importation and use in the United States.

Last week, as an inducement to Israeli Prime Minister Benjamin Netanyahu to accept the Israel/Hamas ceasefire agreement, President Donald Trump secretly agreed to lift the embargo on zero-click.

Here is the backstory.

Though America has employed spies since the Revolutionary War, until the modern era, spying was largely limited to wartime. That changed when America became a surveillance state in 1947 with the public establishment of the Central Intelligence Agency and the secret creation of its counterparts.

The CIA’s stated public task at its inception was to spy on the Soviet Union and its satellite countries so that American officials could prepare for any adverse actions by them. This was the time of the Red Scare, in which both Republicans and Democrats fostered the Orwellian belief that America needed a foreign adversary.

We had just helped the Russians defeat Germany in World War II, and our Russian ally — which was bankrupt and had just lost 27 million troops and civilians — suddenly became so strong it needed to be kept in check. The opening salvo in this absurd argument was fired by President Harry Truman in August 1945 when he used nuclear bombs intentionally to target civilians of an already defeated Japan. One of his targets was a Roman Catholic cathedral.

But his real target — so to speak — was his new friend, Joe Stalin.

When Truman signed the National Security Act into law in 1947, he also had Stalin in mind. That statute, which established the CIA, expressly stated that it shall have no internal intelligence or law enforcement functions and all its collections of intelligence shall come from sources outside the United States.

These limiting clauses were vital to passage of the statute, as members of Congress who crafted it feared the U.S. was creating the type of internal surveillance monster that we had just confronted in Germany.

Of course, no senior official in presidential administrations from Truman to Trump has taken these limitations seriously. As recently as the Obama administration, the CIA boasted that it had the capability of receiving data from all computer chips in the homes of Americans — such as in your microwave or dishwasher.

As well as its presence in your kitchen, the CIA is physically present in all 50 state houses in America. What is it doing there?

The feds admit to funding and empowering 18 domestic intelligence agencies — spies next door. The most notorious of these is the National Security Agency, which, when it last reported, employs 60,000+ persons, mostly civilians, with military leadership.

What do they do? They spy on Americans. We know this thanks to the personal courage of Edward Snowden and others who chose to honor their oaths to uphold the Constitution. NSA spying has produced so much data that the NSA built the second-largest building in the U.S. — after the Pentagon — for use as a storage facility of the data it has collected, and it is running out of room.

What has it collected? Quite simply, everything it can get its hands on. These domestic spies have access to every keystroke and all data on every digital device everywhere in the United States, without a warrant. This is computer hacking, a federal crime; but the feds don’t prosecute the spies they have hired to spy on us.

It also represents an egregious violation of the Fourth Amendment, which guarantees the right to privacy of all persons. The operative language is “the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall not be violated.”

The law defines all searches and seizures conducted without a warrant as unreasonable and thus violative of not only this amendment but also the uniquely American value it was enacted to protect — the right to be left alone. Surely the computer chip in every desktop, mobile device, dishwasher and microwave is an “effect” protected by the Constitution.

The spies and, sadly, the presidents for whom they have worked don’t see it that way. They have claimed in federal courts and elsewhere that the Fourth Amendment does not pertain to them because they are not law enforcement and because they work directly for the president, who, when he is operating as the commander in chief, is free to employ government assets as he wishes, without constitutional constraints.

This argument has been used to justify the CIA’s violent killings of Americans and others in foreign lands using drones and its agents dressed as military. It has justified the brutal torture of foreign nationals, even those whom the CIA deemed were being truthful during their interrogations. And, of course, it has justified ignoring the Constitution and the rights it protects and the values that underlie it.

This argument was also used to justify foreign and federal spying on Trump. Now he wants to make it easier for America’s spies to spy on the rest of us.

Spying belies the very purpose of the Constitution — to keep the government off the people’s backs. Of course, when the late Justice William O. Douglas coined that phrase, there were no computer chips, the CIA was thought to be law-abiding and the NSA didn’t exist.

So, we can see how desirous of secrecy the Trump administration was last week when it agreed to lift the zero-click embargo.

We can try to avoid commercial spyware, but how can we avoid a totalitarian government that spies on everyone?

According to the Declaration of Independence, we can do so by altering or abolishing it.

To learn more about Judge Andrew Napolitano, visit https://JudgeNap.com.
COPYRIGHT 2025 ANDREW P. NAPOLITANO
DISTRIBUTED BY CREATORS.COM

January 31, 2025 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , | Leave a comment

Tulsi Gabbard Right Pick to Shake-Up US Spy Agiencies – Philip Giraldi

By Ekaterina Blinova – Sputnik – 15.11.2024

President-elect Donald Trump nominated the former Democratic congresswoman and a 21-year army reserve veteran to oversee the bewildering array of 18 US spy agencies in his incoming administration.

“A foreign policy and national security appointment that has created considerable dissent is that of Tulsi Gabbard as Director of National Intelligence [DNI],” Philip Giraldi, a former CIA operations officer with experience in Europe and the Middle East, told Sputnik.

The CIA veteran said much of the dissent comes from inside the ‘intelligence community’, including active officers and former staff of organizations like the CIA and NSA.

Objections to Gabbard’s nomination have focused on her lack of intelligence experience, claiming she will “be unable to perceive problems among an unruly 18-member intelligence community,” the pundit said.

But Giraldi countered that she was “smart, experienced and capable enough to gather her own staff around her that will guide her way through the shoals of Washington DC.”
“To my mind, she is an excellent choice, coming from outside of the intelligence community ‘club,’ and could be an effective and ethical DNI,” he added.

The former CIA officer noted that Gabbard is viewed as a “peace candidate” for her opposition to endless overseas wars, the US military occupation of parts of Syria and the demonization of China. But she is also known for her support for Israel, currently waging a war against the Palestinian territory of Gaza.

“It is likely that Trump appointed her to shake up the intel community, which is regarded by many as the black heart of the deep state,” Giraldi said. “She will, of course, be both helped and handicapped by being provided with plenty of ‘direction’ by a president who is fundamentally ignorant of foreign policy and national security issues.”

November 15, 2024 Posted by | Militarism | , , | 2 Comments

‘How I Got Fired From The CIA’: Philip Giraldi Tells All

By Tyler Durden – Zero Hedge – September 6, 2024

Americans are by now familiar with a handful of whistleblowers who after spending years employed by the US intelligence community (IC) eventually saw enough to make them angry and throw away the safety of their future government careers by exposing state secrets to the public. Names like Snowden, Manning, Kiriakou or John Stockwell, William Binney and Thomas Drake (both of NSA whistleblower fame) are well-known, especially in independent and alternative media circles.

But lesser known are the names of those abruptly fired and dismissed from their posts as analysts or as officers for merely questioning and pushing back in real time against what they understood to be disastrous and criminal foreign action and policy. We suspect that this list of names, still largely unknown to the public or media, is much bigger than anyone knows. Such ex-employees of the CIA, NSA, DIA or other alphabet soup agencies typically have their security clearances revoked and are threatened with criminal prosecution should they ever reveal state secrets and classified information. The possibility of future employment even in the civilian world then comes under threat. This means most of them remain unknown.

Typically the American public only finds out about massive covert CIA operations or US war plans long after the fact. For example, the intelligence community knew that the Bush-Cheney White House was gearing up for a ‘shock and awe’ invasion of Iraq for at least many months before it happened. Or for another example, the truth about the CIA’s covert program to overthrow Syria’s Assad (called ‘Timber Sycamore’) finally leaked to The New York Times at least half a decade after it began. Intelligence planners under President Obama understood that the US was arming and training al-Qaeda linked Libyan rebels to overthrow and execute Gaddafi. And all the while, then Secretary of State Hillary Clinton was getting briefed on these US-backed ‘rebels’ conducting extermination campaigns against ethnic minorities. Such horrific and suppressed truths only typically come out years or decades after they happen.

But again, what of those rare voices who dissent in real time and quietly suffer the full retribution of the national security deep state, far from the public eye? ZeroHedge was able to hear directly from one such rare dissenter in the Washington D.C. area this weekend. Former CIA operations officer Philip Giraldi spent over two decades in the agency, which took him around the world. We heard his fascinating and alarming story of “How I Got Fired From The CIA” during a closed-door session at the Ron Paul Institute‘s Liberty Platform conference held in Dulles, Virginia.

Below are ex-CIA Giraldi’s words recounting how his long career led up to a difficult show-down with CIA leadership, and what happened next, as transcribed directly by ZeroHedge [emphasis ours].

* * *

After graduate school and following time in the US Army as an intelligence officer, I joined the CIA. I was an operations officer, which means a spy. I was sent to a lot of nice places to live in, starting with Rome. And then I was in Hamburg and then I was in Istanbul, and then Barcelona. After Barcelona I left the agency for a while and came back as a contractor after 9/11, and I was there for another three years.

How I got in trouble with the agency was… after I came back as a contractor I was sent to Afghanistan – this was after we had overrun it. It didn’t take me long to figure out that we had replaced the Taliban by becoming worse than the Taliban.

And there was no evidence whatsoever coming from CIA analysts that [Osama] bin Laden [and the Afghan government] had actually been involved in 9/11, and so it was a bit of a contradictory assignmentand I became suspicious after that concerning the bogus things going on and what was developing inside the government.

So a couple years later I was back at CIA headquarters at Langley, Virginia and working with them on basic security issues. I had been a counterterrorism specialist and so I was working on different groups that they were considering to be ‘over horizon’ threats to the United States. This was a new concept, this threat. The tune that was being played in Washington was that ‘we are threatened’.

Anyway, while I was doing this I was also talking to a number of my friends who were classmates [from prior schooling and training early in his career] who were analysts and they at this point were very senior analysts in the agency. And the United States meanwhile was preparing to attack Iraq because Iraq was ‘a threat’.

And these friends of mine who were analysts saw all of the raw information that went into what the US government was seeing and they said, “you know this is all bullshit, this is all a lie – the intelligence that’s coming in is fake. And this fake intelligence is being used to justify starting another war.”

So anyway I got ‘converted’ and I started to be somewhat outspoken on the issue of why we should not be going into Iraq and we should leave this alone. And word of this got around [the agency].

So they called me in, they polygraphed meThey wanted to know who among all of my friends have similar views. I refused to cooperate and they said at that point, “well you failed your polygraph exam, we want to take away your security clearance.

So this was after twenty-one years in the agency, they took away my clearance, and I was basically fired. So it’s kind of an interesting tale. I think it’s probably shaped my thinking ever since then. I’m automatically suspicious of people who talk about justifications for wars. I think I will continue for the rest of my life to be that way. Thank you.

September 6, 2024 Posted by | Aletho News | , , | 1 Comment

The FBI ‘Visits’ Scott Ritter

By Andrew P. Napolitano | Ron Paul Institute | August 15, 2024

Among the lesser-known holes in the Constitution cut by the Patriot Act of 2001 was the destruction of the “wall” between federal law enforcement and federal spies. The wall was erected in the Foreign Intelligence Surveillance Act of 1978, which statutorily limited all federal domestic spying to that which was authorized by the Foreign Intelligence Surveillance Court.

The wall was intended to prevent law enforcement from accessing and using data gathered by America’s domestic spying agencies.

Government spying is rampant in the US, and the feds regularly engage in it as part of law enforcement’s well-known antipathy to the Fourth Amendment. Last week, the FBI admitted as much when it raided the home of former Chief UN Weapons Inspector Scott Ritter. Scott is a courageous and gifted former Marine. He is also a fierce and articulate antiwar warrior.

Here is the backstory.

After President Richard Nixon resigned the presidency, Congress investigated his use of the FBI and CIA as domestic spying agencies. Some of the spying was on political dissenters and some on political opponents. None of it was lawful.

What is lawful spying? The modern Supreme Court has made it clear that domestic spying is a “search” and the acquisition of data from a search is a “seizure” within the meaning of the Fourth Amendment. That amendment requires a warrant issued by a judge based on probable cause of crime presented under oath to the judge for a search or seizure to be lawful. The amendment also requires that all search warrants specifically describe the place to be searched and the person or thing to be seized.

The language in the Fourth Amendment is the most precise in the Constitution because of the colonial disgust with British general warrants. A general warrant was issued to British agents by a secret court in London. General warrants did not require probable cause, only “governmental needs.” That, of course, was no standard whatsoever, as whatever the government wants it will claim that it needs.

General warrants authorized government agents to search wherever they wished and to seize whatever they found — stated differently, to engage in fishing expeditions.

FISA required that all domestic spying be authorized by the new and secret FISA Court. Congress then unconstitutionally lowered the probable cause of crime standard for the FISA Court to probable cause of speaking to a foreign agent, and it permitted the FISA Court to issue general warrants.

Yet, the FISA compromise that was engineered in order to attract congressional votes was the wall. The wall prohibited whatever data was acquired from surveillance conducted pursuant to a FISA warrant to be shared with law enforcement.

So, if a janitor in the Russian embassy was really an intelligence agent who was distributing illegal drugs as lures to get Americans to spy for him, any telephonic evidence of his drug dealing could not be given to the FBI.

The purpose of the wall was not to protect foreign agents from domestic criminal prosecutions; it was to prevent American law enforcement from violating personal privacy by spying on Americans without search warrants.

Fast forward to the weeks after 9/11 when, with no serious debate, Congress enacted the Patriot Act. It removed the wall between law enforcement and spying. And by 2001, the FISA Court had on its own lowered the standard for issuing a search warrant from probable cause of speaking to a foreign agent to probable cause of speaking to a foreign person. This, too, was unlawful and unconstitutional.

The language removing the wall sounds benign, as it requires that the purpose of the spying must be national security and the discovered criminal evidence — if any — must be accidental or inadvertent. In January 2023, the FBI admitted that it intentionally uses the CIA and the NSA to spy on Americans as to whom it has neither probable cause of crime nor even articulable suspicion of criminal behavior.

Articulable suspicion is the linchpin of commencing all criminal investigations. Without requiring suspicion, we are back to fishing expeditions.

The FBI’s admission that it uses the CIA and the NSA to spy for it came in the form of a 906-page FBI rulebook written during the Trump administration, disseminated to federal agents in 2021 and made known to Congress last year.

Last week, when FBI agents searched Ritter’s home in upstate New York, in addition to trucks, guns, a SWAT team and a bomb squad, they arrived with printed copies of two years’ of Ritter’s emails and texts that they obtained without a search warrant. To do this, they either hacked into Ritter’s electronic devices — a felony — or they relied on their cousins, the CIA and the NSA, to do so, also a felony.

But the CIA charter prohibits its employees from engaging in domestic surveillance and law enforcement. Nevertheless, we know the CIA is physically or virtually present in all of the 50 US statehouses. And the NSA is required to go to the FISA Court when it wants to spy. We know that this, too, is a charade, as the NSA regularly captures every keystroke triggered on every mobile device and desktop computer in the US, 24/7, without warrants.

The search warrant for Ritter’s home specified only electronic devices, of which he had three. Yet, the 40 FBI agents there stole a truckload of materials from him, including his notes from his U.N. inspector years in the 2000s, a draft of a book he is in the midst of writing and some of his wife’s personal property.

The invasion of Scott Ritter’s home was a perversion of the Fourth Amendment, a criminal theft of his private property and an effort to chill his free speech. But it was not surprising. This is what has become of federal law enforcement today. The folks we have hired to protect the Constitution are destroying it.

To learn more about Judge Andrew Napolitano, visit https://JudgeNap.com.
COPYRIGHT 2024 ANDREW P. NAPOLITANO
DISTRIBUTED BY CREATORS.COM

August 15, 2024 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , | Leave a comment

US NSA Purchasing Web Browser Data Without Warrant – Letter

By Mary Manley – Sputnik – 27.01.2024

Amid rising concerns that foreign governments may be purchasing the personal data of citizens, this recent disclosure is the latest evidence of the US government doing such.

The US National Security Agency is buying Americans’ internet browning information from commercial brokers without a warrant, according to a letter between US Senator Ron Wyden (D-OR) and the Director of National Intelligence Avril Haines.

Wyden, who made the letter from Thursday public, called for US intelligence officials to cease purchasing Americans’ data unless it has been obtained in a “lawful manner”.

“As you know, U.S. intelligence agencies are purchasing personal data about Americans that would require a court order if the government demanded it from communications companies,” writes Wyden.

“Such location data is collected from Americans smartphones by app developers, sold to data brokers, resold to defense contractors, and then resold again to the government. In addition; the National Security Agency (NSA) is buying Americans’ domestic internet metadata,” he continues.

He added that “until recently, the data broker industry and the intelligence community’s (IC) purchase of data from these shady companies has existed in a legal gray area”. And that app and advertising companies did not disclose their sale and sharing of personal data with brokers nor did they “obtain informed consent”.

“The secrecy around data purchases was amplified because intelligence agencies have sought to keep the American people in the dark. It took me nearly three years to clear the public release of information revealing the NSA’s purchase of domestic internet metadata,” the senator emphasized.

The senator then points out that the Federal Trade Commission (FTC) brought an action against the data broker X-Mod Social earlier this month. Wyden says that lawyers for the company admitted that they were selling data collected from phones in the US to “US military customers, via defense contractors”.

The FTC then emphasized that the sales of location data is dangerous as it can be used to track people to “sensitive locations, including medical facilities, places of religious worship, places that may be used to infer an LGBTQ+ identification, domestic abuse shelters, and welfare and homeless shelters”. They add that consumers should be made aware that their data is being sold to “government contractors for national security purposes”.

Under Secretary of Defense Ronald S. Moultrie defended the methods of government data collecting in a separate letter released by Wyden.

“I am not aware of any requirement in U.S. law or judicial opinion… that DOD obtain a court order in order to acquire, access or use information, such as CAI, that is equally available for purchase to foreign adversaries, U.S. companies and private persons as it is to the U.S. government,” he wrote.

Army General Paul M. Nakasone, the director of the NSA, also justified the agency’s actions by explaining that the NSA acquires “commercially available information” but that those acquisitions are limited. Adding that they don’t include location data from phones “known to be used in the US”, and that the “non-content” data they do buy is located abroad and is critical for the US Defense Industrial base, according to a separate letter.

“NSA understands and greatly values the congressional and public trust it has been granted to carry out its critical foreign intelligence and cybersecurity missions on behalf of the American people,” Gen. Nakasone wrote.

In the end of his letter, Wyden wrote that the US government should not be “funding and legitimizing shady industry whose flagrant violations of Americans’ privacy are not just unethical, but illegal”. He then requested that Haines direct each IC element to take on a list of actions he outlined, including taking an inventory of the information they have already collected and to discard any information that does not meet consent laws.

January 28, 2024 Posted by | Civil Liberties | , , | Leave a comment

‘If We Get Away With It, It’s Legal’: Documents Reveal New Details on U.S. Government’s ‘Censorship-Industrial Complex’

By Michael Nevradakis, Ph.D. | The Defender | November 29, 2023

Government agencies, private-sector firms, academia and nonprofits were collaborating to combat alleged “misinformation” and “disinformation” as far back as 2017, according to new documents released Tuesday.

The “CTIL Files” — which refer to the Cyber Threat Intelligence League, or CTI League, a key player in the so-called “Censorship-Industrial Complex” — are based on documents received from an unnamed but “highly credible” whistleblower, according to investigative journalists Michael Shellenberger, Alex Gutentag and Matt Taibbi, who released the files.

The new documents rival or exceed the “Twitter Files” and “Facebook Files” in “scale and importance,” according to the journalists, two of whom — Shellenberger and Taibbi — were instrumental in releasing many of the “Twitter Files” that first called attention to the “Censorship-Industrial Complex.”

A comprehensive picture of the birth of the ‘anti-disinformation’ sector

The documents, which the journalists detailed on Substack, center around the activities of the CTI League, which “officially began as the volunteer project of data scientists and defense and intelligence veterans but whose tactics over time appear to have been absorbed into multiple official projects, including those of the Department of Homeland Security (DHS).”

According to the journalists, the CTI League documents “offer the missing link … to key questions not addressed in the Twitter Files and Facebook Files” and “offer a comprehensive picture of the birth of the ‘anti-disinformation’ sector.”

“The whistleblower’s documents describe everything from the genesis of modern digital censorship programs to the role of the military and intelligence agencies, partnerships with civil society organizations and commercial media, and the use of sock puppet accounts and other offensive techniques,” the journalists wrote.

Documents in the “CTIL Files” show members of the CTI League, DHS officials and key figures from social media companies “all working closely together in the censorship process.”

This “public-private model” laid the groundwork for “anti-misinformation” and “anti-disinformation” campaigns launched by the U.S. and U.K. governments in 2020 and 2021, the journalists wrote, including attempts to circumvent First Amendment protections against government censorship of speech in the U.S.

Such tactics included “masking censorship within cybersecurity institutions and counter-disinformation agendas; a heavy focus on stopping disfavored narratives, not just wrong facts; and pressuring social media platforms to take down information or take other actions to prevent content from going viral,” they added.

The CTI League went still further though, the journalists wrote, engaging “in offensive operations to influence public opinion, discussing ways to promote ‘counter-messaging,’ co-opt hashtags, dilute disfavored messaging, create sock puppet accounts, and infiltrate private invite-only groups.”

Such censorship lies at the heart of Missouri et al. v. Biden et al., a First Amendment censorship case where injunctions were issued against several federal agencies and government officials, barring them from communicating with social media companies regarding user content. The injunctions are now under review by the U.S. Supreme Court.

Former British intelligence analyst charged with creating counter-disinformation project

The journalists wrote that while previous releases of the “Twitter Files” and “Facebook Files” revealed “overwhelming evidence of government-sponsored censorship,” they had not revealed “where the idea for such mass censorship came from.”

The whistleblower alleged that a key figure in the CTI League, “a ‘former’ British intelligence analyst, was ‘in the room’ at the Obama White House in 2017 when she received the instructions to create a counter-disinformation project to stop a ‘repeat of 2016.’”

By 2019, this analyst, Sara-Jayne “SJ” Terp, had “developed the sweeping censorship framework,” leading a team of U.S. and U.K. “military and intelligence contractors” who “co-led CTIL.” Previously, in 2018, Terp attended a 10-day military exercise organized by the U.S. Army Special Operations Command, according to the journalists.

It was there that Terp met Pablo Breuer, a former U.S. Navy commander, who became a key figure in the CTI League. According to Wired, the two realized that misinformation “could be treated … as a cybersecurity problem.” This led to the development of CogSec, which soon housed the “MisinfoSec Working Group.”

“Terp’s plan, which she shared in presentations to information security and cybersecurity groups in 2019, was to create ‘Misinfosec communities’ that would include government,” the journalists wrote.

By spring 2020, it appears Terp achieved this plan, as the CTI League partnered with the Cybersecurity and Infrastructure Security Agency (CISA), which has been implicated in prior releases of the “Twitter Files” for its role in the “Censorship-Industrial Complex.”

The MisinfoSec Working Group included Renee DiResta, a former CIA operative who worked for the Election Integrity Partnership (EIP) — later renamed the Virality Project (VP). This group “created a censorship, influence, and anti-disinformation strategy called Adversarial Misinformation and Influence Tactics and Techniques (AMITT).”

According to the journalists, AMITT adapted “a cybersecurity framework developed by MITRE, a major defense and intelligence contractor that has an annual budget of $1 to $2 billion in government funding.” MITRE is a backer of the Vaccination Credential Initiative and the SMART Health Card — a digital “vaccine passport.”

Terp used AMITT to develop the DISARM framework, which the World Health Organization (WHO) applied in “countering anti-vaccination campaigns across Europe.”

The same framework “has been formally adopted by the European Union and the United States as part of a ‘common standard for exchanging structured threat information on Foreign Information Manipulation and Interference’” according to the journalists.

‘Can we get a troll on their bums?’

According to the journalists, MisinfoSec’s motivation for counter-misinformation was the “twin political earthquakes of 2016: Brexit and the election of Trump.”

“There’s something off kilter with our information landscape,” Terp and other CTI League members wrote, according to documents.

“The usual useful idiots and fifth columnists — now augmented by automated bots, cyborgs and human trolls — are busily engineering public opinion, stoking up outrage, sowing doubt and chipping away at trust in our institutions. And now it’s our brains that are being hacked,” they added.

In spring 2020, the CTI League set its sights on COVID-19-related narratives, targeting users who engaged in messaging that ran contrary to official policy.

“CTIL began tracking and reporting disfavored content on social media, such as anti-lockdown narratives like ‘all jobs are essential,’ ‘we won’t stay home,’ and ‘open America now,’” the journalists wrote.

“CTIL created a law enforcement channel for reporting content as part of these efforts. The organization also did research on individuals posting anti-lockdown hashtags … and kept a spreadsheet with details from their Twitter bios. The group also discussed requesting ‘takedowns’ and reporting website domains to registrars,” they added.

Regarding the “we won’t stay home” narrative, internal documents revealed by the whistleblower showed that CTI League members wrote, “Do we have enough to ask for the groups and/or accounts to be taken down or at a minimum reported and checked?” and “Can we get all troll on their bums if not?”

They also called posters circulating online promoting anti-lockdown posters “disinformation artifacts,” saying, “We should have seen this one coming” and asking “can we stop the spread, do we have enough evidence to stop superspreaders, and are there other things we can do (are there countermessagers we can ping etc).”

During CTI League brainstorming sessions to develop strategies for “counter-messaging for things like encouraging people to wear masks,” statements such as “Repetition is truth” were uttered by CTI League staff, the journalists noted.

The CTI League also sought to go “beyond simply urging Twitter to slap a warning label on Tweets, or to put individuals on blacklists.”

According to the journalists, “The AMITT framework calls for discrediting individuals as a necessary prerequisite of demanding censorship against them” and “trying to get banks to cut off financial services to individuals who organize rallies or events.”

As part of these efforts, even truthful information was targeted. In a 2019 podcast on “Disinformation, Cognitive Security, and Influence,” Terp admitted, “Most information is actually true … but set in the wrong context.”

“You’re not trying to get people to believe lies most of the time,” she said. “Most of the time, you’re trying to change their belief sets. And in fact, really deeper than that, you’re trying to change, to shift their internal narratives … the set of stories that are your baseline for your culture.”

Previous “Twitter Files” releases have revealed that true information was targeted for censorship by the U.S. government and social media platforms like Twitter if the information contradicted official policy regarding COVID-19 vaccines and restrictions.

‘Cognitive security’ a euphemism for censorship

In the same podcast, according to the journalists, Terp said, “Cognitive security is the thing you want to have. You want to protect that cognitive layer. It basically, it’s about pollution. Misinformation, disinformation is a form of pollution across the Internet.”

The journalists wrote, “A key component of Terp’s work through CTIL, MisinfoSec, and AMITT was to insert the concept of ‘cognitive security’ into the fields of cybersecurity and information security.”

Such “cognitive security” was seen as being threatened by the erosion of the mass media’s control on information and influence over public opinion.

Documents revealed by the whistleblower included a MisinfoSec report stating “For a long time, the ability to reach mass audiences belonged to the nation-state (e.g. in the USA via broadcast licensing through ABC, CBS and NBC).”

“Now, however, control of informational instruments has been allowed to devolve to large technology companies who have been blissfully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means,” the report said.

The same report also called for a form of “pre-bunking,” to “preemptively inoculate a vulnerable population against messaging,” suggesting that DHS-funded Information Sharing and Analysis Centers could be used to promote such pre-bunking.

‘If we get away with it, it’s legal’

Public-private partnerships were specifically sought out in an attempt to circumvent First Amendment free speech protections in the U.S., the documents revealed, even while BloombergThe Washington Post and Wired wrote glowing articles portraying the CTI League as a mere group of “volunteer” cybersecurity experts.

Yet, according to the journalists, “In just one month, from mid-March to mid-April [2020], the supposedly all-volunteer CTIL had grown to ‘1,400 vetted members in 76 countries’” and had “helped to take down 2,833 cybercriminal assets on the internet” including some which impersonated government organizations, the United Nations and WHO.

On the same 2019 podcast, according to the journalists, Breuer explained how the CTI League was getting around the First Amendment, by working to get “nontraditional partners into one room,” including “maybe somebody from one of the social media companies, maybe a few special forces operators, and some folks from Department of Homeland Security.”

Together, they would “talk in a non-attribution, open environment in an unclassified way so that we can collaborate better, more freely and really start to change the way that we address some of these issues,” Breuer said.

Breuer even likened these tactics to those employed by the Chinese government, saying “If you talk to the average Chinese citizen, they absolutely believe that the Great Firewall of China is not there for censorship. They believe that it’s there because the Chinese Communist Party wants to protect the citizenry and they absolutely believe that’s a good thing.”

“If the US government tried to sell that narrative, we would absolutely lose our minds and say, ‘No, no, this is a violation of our First Amendment rights.’ So, the in-group and out-group messaging have to be often different,” he said.

The whistleblower told the journalists that CTI League leaders did not discuss their potential violation of the First Amendment.

“The ethos was that if we get away with it, it’s legal, and there were no First Amendment concerns because we have a ‘public-private partnership’ — that’s the word they used to disguise those concerns. ‘Private people can do things public servants can’t do, and public servants can provide the leadership and coordination,’” the whistleblower said.

According to the journalists, the authors of the MisinfoSec report also “advocated for police, military, and intelligence involvement in censorship, across Five Eyes nations, and even suggested that Interpol should be involved.”

The CTI League documents also suggest that the organization was involved in a form of domestic spying, with one document noting that while censorship activities abroad are “typically” performed by “the CIA and NSA and the Department of Defense,” such efforts “against Americans” necessitate the use of private partners because the government lacks the “legal authority” to do so.

According to the whistleblower, CTI League members also went to great lengths to conceal their activities, with a CTI League handbook recommending the use of burner phones, online pseudonyms and the generation of fake AI faces. One document advised, “Lock your s**t down … your spy disguise.”

One suggested list of questions to be posed to prospective CTI League members proposed asking whether those individuals had ever “worked with influence operations (e.g. disinformation, hate speech, other digital harms etc) previously” and whether those efforts included “active measures” and “psyops” (psychological operations).

Indeed, according to the documents, several CTI League members had worked for the military or intelligence agencies, while according to the whistleblower, “roughly 12-20 active people involved in CTIL worked at the FBI or CISA” — even, for a time, displaying their agency seals alongside their names on the CTI League’s internal Slack channel.

Terp, for instance, previously designed machine learning algorithms and unmanned vehicle systems for the U.K.’s Ministry of Defence.

According to the whistleblower, the CTI League sought “to become part of the federal government.”

Shellenberger, Taibbi to testify before Congress this week

According to the journalists, the FBI declined to comment, while CISA, Terp and other CTI League figures did not respond to requests for comment.

However, one CTI League member, Bonnie Smalley, did respond to the journalists’ request. She wrote, verbatim, “all i can comment on is that i joined cti league which is unaffiliated with any govt orgs because i wanted to combat the inject bleach nonsense online during covid. … i can assure you that we had nothing to do with the govt though.”

“CTIL appears to have generated publicity about itself in the Spring and Fall of 2020 for the same reason EIP did: to claim later that its work was all out in the open and that anybody who suggested it was secretive was engaging in a conspiracy theory,” the journalists wrote.

“But as internal messages have revealed, much of what EIP did was secret, as well as partisan, and demanding of censorship by social media platforms, contrary to its claims,” they said, adding that “EIP and VP, ostensibly, ended, but CTIL is apparently still active, based on the LinkedIn pages of its members.”

The journalists said the documents will be presented to Congressional investigators and made public, while protecting the identity of the whistleblower.

Shellenberger and Taibbi will testify at Thursday’s hearing of the U.S. House of Representatives’ Select Subcommittee on the Weaponization of the Federal Government. They previously testified before the same committee in March.

On Tuesday, Taibbi appeared in a live YouTube webcast presenting some of the key revelations from the first release of the “CTIL Files.”


Michael Nevradakis, Ph.D., based in Athens, Greece, is a senior reporter for The Defender and part of the rotation of hosts for CHD.TV’s “Good Morning CHD.”

This article was originally published by The Defender — Children’s Health Defense’s News & Views Website under Creative Commons license CC BY-NC-ND 4.0. Please consider subscribing to The Defender or donating to Children’s Health Defense.

November 30, 2023 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , , , , , | Leave a comment

Decades before Snowden, this American patriot waged war against illegal surveillance in the US

In the 1970s, US Army Captain Christopher Pyle blew the lid on government agencies’ domestic spying

Former undercover agent Christopher Pyle testifies in the Senate that the Army has spied on politicians and thousands of ordinary Americans, February 24, 1971. © Bettmann Archive/Getty Images
By Robert Bridge | RT | October 11, 2023

In 1970, a US Army captain went rogue after he discovered that the military was conducting surveillance on dissidents across the country, thus sparking the first effort in modern times to tame US intelligence.

In 1968, almost half a century before the world heard the name of Edward Snowden, the former NSA contractor who blew the whistle on a US-run global surveillance system, Christopher Pyle, an Army captain who taught law at the Army’s intelligence school at Fort Holabird, Maryland, was about to do something no less memorable.

After Pyle had concluded one of his popular lectures on civil disorder, which focused on how the military could better quell riots in those highly volatile times, a military officer directly involved in such operations approached him with the request for a meeting. Several days later, Pyle was escorted into a large warehouse facility that once had been used to assemble railroad engines. In his 2006 book, No Place to Hide, Robert O’Harrow described what happened next.

“Pyle walked into the cage, where an officer showed him books containing mug shots. He looked in the first volume and saw a familiar face. It was Ralph David Abernathy, Martin Luther King’s assistant. Officers called the books the ‘black list.’”

“Outside the cage, Pyle saw more than a dozen teletype machines. The head of the CONUS [acronym for Continental United States] intelligence section told him they were spitting out reports from some fifteen hundred Army operatives about demonstrations with twenty people or more. Pyle was starting to understand how naive he’d been. He began formulating a plan. He would be getting out of the Army soon. He could tell the world about what was going on. When he joined the Army he took an oath to defend the country against all enemies, here and abroad. In his mind now, that included the Army’s intelligence operation. They turned in their security badges and left the building.”

And thus was born one of the most consequential whistleblowers of the post-World War II era.

In January 1970, Pyle, now a full-fledged private citizen, penned an article for the Washington Monthly entitled, ‘CONUS Intelligence: The Army Watches Civilian Politics.’ The explosive opening paragraph said it all: “[t]he U.S. Army has been closely watching civilian political activity within the United States. Nearly 1,000 plainclothes investigators … keep track of political protests of all kinds – from Klan rallies in North Carolina to anti-war speeches at Harvard.”

Immediately, some US media swung into action as journalists began hounding the Department of Defense and the US Army to determine the veracity of the claims. Given Pyle’s extreme proximity to the subject matter at hand, however, it soon became clear that Uncle Sam got caught with his hand in the proverbial cookie jar.

Pyle’s revelations were enough to prompt Congress, as well as a slew of litigation lawyers, to sit up and take notice. The chair of the Senate Judiciary Subcommittee on the Constitution, Senator Samuel James Ervin, a self-described “country lawyer” from North Carolina, worked together with Pyle to investigate and expose the clandestine domestic spying program.

Pyle and Ervin eventually spent countless hours delivering testimony before various congressional meetings over a span of several years. The first fruit of their labors came with passage of the Privacy Act of 1974. Signed into law by President Gerald R. Ford on December 31, 1974, the legislation states: “No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains…” In other words, although the law didn’t actually stop the US Army or intelligence agencies from infiltrating civil action groups and public demonstrations, it did hamper the feds from disclosing the identities of the activists without their foreknowledge.

To this end, Pyle served as a consultant for three Congressional committees: the Subcommittee on Constitutional Rights on the Judiciary Committee (1971-1974), the Committee on Government Operations (1974), and the Select Committee to Study Government Operations with Respect to Intelligence Activities (1975).

According to Pyle, as a result of those successful investigations, “the entire US Army Intelligence Command was abolished and all of its files were burned.” For his actions, Pyle ended up on then-President Richard Nixon’s notorious “Enemies List.”

Given the severity of their overall findings, however, the congressional investigations triggered by the US Army captain did not stop there.

1975, the ‘Year of Intelligence’  

On January 27, 1975, by a vote of 82 to 4, the US Senate created the so-called Church Committee, chaired by Democrat Senator Frank Church, to further examine abuses by the Central Intelligence Agency (CIA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), and the Internal Revenue Service (IRS). The House carried out its own set of investigations with the Pike Commission and the Rockefeller Commission, thereby prompting the media to label 1975 as the ‘Year of Intelligence,’ and not in a way that was flattering to the intelligence community.

Pyle lent his expertise to the ambitious Church Committee, headed by Iowa Senator Frank Church, which discovered a number of questionable, unethical and outright illegal activities by the CIA between 1959 and 1973. Detailed in a series of reports dubbed the ‘Family Jewels’, these activities included conducting physical surveillance on journalists, amassing files on nearly 10,000 Americans connected to the antiwar movement, funding behavior modification research on unwitting subjects, and plots to assassinate foreign leaders, including Cuban President Fidel Castro and DR Congolese leader Patrice Lumumba.

The most impactful discovery made by the Church Committee, however, was that of Project SHAMROCK. Started in 1940 during World War II and running into the 1970s, the NSA was given secret authority to access all incoming, outgoing, and transiting telegrams via the Western Union and its associates RCA and ITT. At the peak of Project SHAMROCK, 150,000 messages were captured and analyzed by NSA personnel in a month. The pertinent information contained in these messages was then forwarded to other intelligence agencies, including the CIA, FBI, Secret Service and the Department of Defense. This formed the basis of the so-called ‘Watch List’ of the 1970s that included thousands of American citizens, including high-ranking politicians, celebrities, academics and antiwar activists.

The findings led Senator Frank Church to conclude that Project SHAMROCK was “probably the largest government interception program affecting Americans ever undertaken.”

Based on the recommendations of the Church Committee, Congress passed the Foreign Intelligence Surveillance Act (FISA) of 1978. Under FISA, the government is required to obtain warrants to conduct electronic surveillance against individuals from a special court. Such a warrant requires “probable cause to believe” that the surveillance target is a foreign government or organization, or an agent thereof, “engaging in clandestine intelligence activities or international terrorism,” as per a Department of Justice (DOJ) clarification.

Yet, as we shall see, even this minor legislative hurdle would prove too cumbersome for the Bush administration in its war on terror.

Privacy in the age of terrorism

The tireless work of the Church Commission was put to a test in the aftermath of the September 11, 2001 terrorist attacks as US lawmakers from both sides of the political aisle were prepared to sacrifice citizens’ privacy in the name of national security. Thus, less than one week after three hijacked aircraft toppled the World Trade Center and damaged the Pentagon, killing some 3,000 people in the process, one of the most comprehensive plans for conducting surveillance on American civilians and individuals worldwide – the USA PATRIOT ACT (an acronym for ‘Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act’) – was already being disseminated to members of Congress.

Arguably the most controversial part of the Patriot Act is contained in Section 215 of the 342-page document, which calls for sweeping government powers against private and public enterprises, individuals, and personal privacy. Most crucially, Section 215 did away with the requirement that the target of the records search be a non-US citizen and “an agent of a foreign power.” American citizens were now legitimate targets as well.

In the Senate, the Patriot Act passed in a 99 – 1 vote. The only senator to vote against it was Wisconsin Democrat Russell Feingold. “There is no doubt,” he declared on the Senate floor before the historic vote, “that if we lived in a police state, it would be easier to catch terrorists…But that would not be a country in which we would want to live.”

Even with this widening of surveillance powers, then-US President George W. Bush, as part of the global ‘War on Terror’ that he declared following the events of 9/11, ordered the NSA to tap the communications of an untold number of people in the US, including citizens, without the warrants demanded by the FISA court – despite the fact that between 1979 and 2005, only four out of over 15,000 warrant requests were rejected by the FISA court.

Christopher Pyle, who was still committed to his cause over 30 years after he chose to become a whistleblower, labeled Bush “a criminal” for violating the FISA law and suggested that he should be impeached.

“The Constitution says he must take care that all laws be faithfully executed, not just the ones he likes,” Pyle said during an interview with Democracy Now in 2005. “The statute says … that the Foreign Intelligence Surveillance Act is the exclusive law governing these international intercepts, and he violated it anyway. And the law also says that any person who violates that law is guilty of a felony, punishable by up to five years in prison. By the plain meaning of the law, the President is a criminal.”

More recently, Christopher Pyle, 83, who now works as Professor Emeritus of Politics at Mount Holyoke College, spoke out on behalf of Edward Snowden, the former NSA contractor turned whistleblower who revealed a massive global intelligence program run by the so-called Five Eyes, a once-secretive intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States.

“He’s just an ordinary American,” Pyle explained in 2013. “He’s trying to start a debate in this nation over something that is critically important. He should be respected for that and taken at face value and we should move on to the big issues, including the corruption of our system that is done by massive secrecy and by massive amounts of money and politics.”

Robert Bridge is an American writer and journalist. He is the author of ‘Midnight in the American Empire,’ How Corporations and Their Political Servants are Destroying the American Dream.

October 11, 2023 Posted by | Civil Liberties, Full Spectrum Dominance, Solidarity and Activism, Timeless or most popular | , , , | 1 Comment

RT surges after X (aka Twitter) removes censorship – ‘disinformation’ lobbyist

RT | September 27, 2023

NewsGuard, a self-proclaimed disinformation watchdog, has lamented the rise in popularity of RT and 11 other news outlets after Elon Musk relaxed censorship on X (formerly Twitter).

Among 12 media accounts analyzed, RT experienced the highest engagement growth in the 90 days following Musk’s decision in April to remove ‘government-funded’ and ‘state-affiliated’ labels from certain outlets, NewsGuard said on Tuesday. The number of ‘likes’ and reposts for RT’s account increased to 2.5 million in the period studied, up from 1.3 million.

The analysis focused on Chinese, Iranian, and Russian media outlets, which NewsGuard branded “state-run disinformation sources” and purveyors of “propaganda.”

NewsGuard cited political memes posted by Iranian news accounts as purported examples of disinformation. Another instance was supposedly a link shared by Iran’s PressTV to an article on remarks made by US presidential hopeful Robert F. Kennedy Jr., who argued that Americans “created” the Islamic State terrorist group. Kennedy made the claim during an election rally in Boston, where he accused Washington of decades of misguided foreign policy.

The self-described disinformation watchdog advocates imposing strict moderation on online platforms to protect users from supposed foreign influence. NewsGuard’s rating of news outlets generally labels mainstream Western media as trustworthy, while outlets linked with governments opposed by the US are branded deceitful.

Among NewsGuard’s advisers is Michael Hayden, a former head of the CIA and the NSA. He was notably one of the more than 50 former intelligence officials who claimed in 2020 that the factual New York Post story about Hunter Biden’s laptop had “all the classic earmarks of a Russian information operation.”

Others include former NATO Secretary General Anders Fogh Rasmussen, former US Secretary of Homeland Security Tom Ridge, and former US Under Secretary of State Richard Stengel. The latter stated publicly that his job in the Obama administration was jokingly described as “chief propagandist” by others.

The Pentagon and Microsoft have contracted NewsGuard services.

The report heavily implied that the lack of X labels for the likes of RT was to blame for the rise in engagements, as it is now “impossible for users to know whether an account is government-affiliated” simply by looking at posts.

NewsGuard claimed that the 12 accounts in question are attempting to conceal their associations, such as when RT rebranded from its previous name Russia Today. The report described the move as taking place “several years ago,” although the rebranding was implemented in 2009.

Musk, who formally stepped down as CEO of X (then Twitter) in June, ordered the ‘government-funded’ and ‘state-affiliated’ labels to be removed amid a row with America’s NPR, which exited the platform after being branded. Around the same time, X ended its ‘shadow-ban’ on RT and others, lifting a restriction imposed under the previous executive leadership.

The subsequent publication of the ‘Twitter Files’ has detailed extensive US government oversight and pressure on the social media company to amplify Pentagon talking points over dissenting voices.

NewsGuard conceded that Musk’s move to end restrictions on X, which it described as “pushing” undesirable accounts, may have benefited them.

In August, NATO’s Strategic Communications Center of Excellence blamed Musk for a “dramatic rise” in the visibility of Russian government and media accounts.

September 28, 2023 Posted by | Full Spectrum Dominance | , , , | 1 Comment

No US Presidential Election in 2024

The Automatic Earth | August 11, 2023

In January 2023, US special counsel Jack Smith applied for -and received- a subpoena for Twitter, specifically for all of Donald Trump’s utterances at the site through the years, including the ones he may have never published. Note: the subpoena came long after Trump left Twitter. And no, it wasn’t X then, and therefore it is not now. He wrote it when it was Twitter. Important. Trump left Twitter (was cancelled) on Jan 8 2021, Elon Musk bought it on October 27 2022, and renamed it “X” in late July 2023. Just so we get our horses and dogs in line.

Special counsel Jack Smith received his Twitter/Trump subpoena with the added provision that it had to be entirely secret, not even Twitter or Trump could know. US District Court Judge Beryll Howell gave Smith what he wanted, agreeing that if Trump’s years-old Twitter past was known, he would become a flight risk. But both Smith and Howell knew this was absolute nonsense. Not only is Twitter the last place you turn to when you have nefarious secrets to hide (it’s the opposite!), but the man is running for President, for God’s sake! And because of some 5 year old -or so- tweets he would pack in the family and disappear to an -underground- bungalow on Vanatua, never to be heard from again?

I would put this down as the moment when it became impossible for the US to have a presidential election in 2024. We’ve had some 8 years of this anti-Trump circus now, non-stop, Hillary, Pelosi, Adam Schiff and Robert Mueller, yada yada yada, but I don’t think we’ve reached the point before where the elections might as well be cancelled. We’re there now though. And that is a BIG point. We’ve let it come far too far. We’re in slapstick territory.

Think of it as a boxing match. In the one corner, we have the former champion/president, wearing the slightly widened red trunks. At age 77, he looks somewhat bruised and battered, but he doesn’t look beaten- yet. What’s noticeable though is that his corner is empty, except for Melania cleaning his brow, not even his own party is there to support him. There are some 90 million Americans behind him, but they are at home.

In the other corner, the defending champion, in blue trunks, weighing in at about 25 pounds and falling, looks a little lost. But behind him in his corner he has thousands of operatives: his entire party, plus the CIA and NSA and FBI and DOJ. And all the newspapers and TV channels and social media in the country. And all the judges and prosecutors, the DAs and GAs, it’s a veritable love-in. The guy in the blue trunks could be braindead and he’d still win. And I wish I was a cartoonist, and could capture the entire image in one frame. I can see it in front of my eyes, but I can’t draw it.

Where the boxing analogy goes astray is that in this case the blue side is allowed to harass the red side before, during and after the (preparations for) the fight, and during the fight itself. You can’t a have a free and fair fight, and a level playing field, if some “blue operatives” can put shackles on the ankles and wrists of the red candidate, or even lock him up while he’s preparing for the bell to ring. If the system allows him to be a candidate, it must also allow him to prepare for his candidacy, in the same way that his opponent can. That is not happening.

US special counsel Jack Smith has announced that the US plans to drag Trump before court after court starting January 2 2024. At least 3 major indictments (will be a dozen) , likely many more, and at my last count, 82 charges (it’s impossible to keep up). Smith can then finger pick any of these charges to put Trump in custody, whenever he feels like it. The judges are almost all “blue”, and so are the jury pools: New York and DC. And this is while he’s supposed to be campaigning!

And also: Trump allegedly already spent $40 million on legal expenses. But what if Trump doesn’t have $40 million? We could argue the $40 million should be spent on his campaign. Look at Imran Khan, guys, who was just convicted to a 3-year prison term in Pakistan on US directives. Like Trump, he is the most popular political candidate in his nation, and they got him on selling necklaces when he was PM.

That is Trump’s future too. And hence, the end of American democracy. He doesn’t stand a chance. And if he doesn’t, the system doesn’t, and you don’t. You’re fine as long as you agree with the boot stomping on your neck, and you maybe even enjoy it. But if you don’t, Jack Smith and his ilk – and Obama, Hillary, Adam Schiff, Pelosi, the whole gang, will come with charges and indictments directed at you.

You’re on the verge of the abyss. if you want to take your chances with what you might find down there, fair enough. But always know that you have a choice. And that, if somehow they do manage to stage a presidential election in November 2024 as things stand now, it’ll be fake from A to Z. Grow a pair, people, grow a backbone. You’re going to need them.

August 12, 2023 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , | 2 Comments

Greenwald: Ex-Spies Run Censorship Operations for Tech Giants

By Brenda Baletti, Ph.D. | The Defender | July 14, 2023

Former security state operatives occupy the highest positions at Big Tech internet platforms, and are responsible for censoring political content and limiting public debate, Glenn Greenwald reported on Tuesday.

Americans have been aware of security state efforts to control media narratives since the 1970s, when the Senate’s Church Committee exposed the CIA’s Operation Mockingbird, Greenwald told listeners of his podcast, “System Update.”

Under that program, CIA agents covertly infiltrated and influenced the nation’s largest news organizations.

Project Mockingbird’s exposure greatly embarrassed the media and the government,  as the CIA is forbidden from targeting the American public, Greenwald said.

Over the past decade, a series of whistleblowers revealed the U.S. security state has again amped up its covert targeting of American citizens, particularly since the start of the post-9/11 War on Terror.

News that intelligence agencies spied on Americans or infiltrated the news media was considered scandalous just over a decade ago.

But today, things have changed, Greenwald said. In fact, it has become common for top news outlets to openly hire former U.S. security state agents to report and comment on the news.

And in the last few months, the Twitter files and the latest Missouri v. Biden decision made clear how aggressive the censorship regime has become.

The U.S. government, in part, dictates what content social media platforms ought to allow on their sites, Greenwald said. But, he added:

“There’s another element, another layer to it, which is they’ve infiltrated these Big Tech companies — these ex-CIA agents have — exactly like they’ve infiltrated corporate news outlets. They’re all over these censorship regimes.”

Greenwald said top positions at the tech firms are now held by people coming directly from intelligence agencies.

For example James Baker, who the Twitter Files revealed was involved in most censorship decisions prior to Elon Musk’s takeover of the platform, worked as general counsel for the FBI before he became deputy counsel for Twitter.

“So the FBI sent its top lawyer to go work in the part of Twitter that censored political content,” Greenwald said. “Do you understand? That’s the FBI controlling our domestic political discourse and the limits of it.”

MintPress News profiled a number of former CIA agents who now manage and develop misinformation policies for Facebook in a July 2022 article that Greenwald shared.

According to the article, the problem isn’t that these people are incompetent. “The problem is that having so many former CIA employees running the world’s most important information and news platforms is only one small step removed from the agency itself deciding what you see and what you do not see online — and all with essentially no public oversight.”

Greenwald said this allows the intelligence agencies to maintain significant influence over news and information flows, while maintaining “some veneer of plausible deniability.”

The U.S. government doesn’t need to tell the platforms what to do because the people making the decisions rose in the ranks of the National Security State first — “meaning their outlooks match those of Washington’s,” Greenwald said, quoting MintPress News.

Greenwald said this is evidence of a multi-pronged effort, where on the one side, former security state operatives propagandize the American people on corporate media and on the other side, they control what can be said on the largest Big Tech platforms.

As a result, he said, the entire range of dissenting views is “simply banned.”

The ‘censorship-industrial complex’

The Twitter account @NameRedacted247 tracks the movement of security state operatives into social media corporations where they work on misinformation and disinformation.

The account provided a thread, which Greenwald’s team confirmed, reporting that as of December 2022, Google employed at least 165 people in high-ranking positions from the intelligence community.

Across the company there were 27 former CIA agents, 52 former FBI agents, 30 people who came from the National Security Agency (NSA), 50 from the U.S. Department of Homeland Security (DHS) and six from the Director of National Intelligence.

Facebook had at least 115 former security state operatives in high-ranking positions — 17 from the CIA, 37 from the FBI, 23 from the NSA and 38 from DHS.

Google’s “trust and safety team,” which manages what content is allowed on the platform, is managed by three former CIA agents who control misinformation and hate speech.

One of them, Nick Rossman, referred to “anti-vaxxers” on Twitter as “Nazis” and “Confederates,” Greenwald said, asking:

“Do you think these people are objective arbiters of misinformation? Or do you think they’re using their censorship power inside Big Tech for this in the same way that people inside corporate media are using it to advance the propaganda games of these agencies against their own citizens?”

Greenwald presented a series of online profiles of people who worked in intelligence for years or decades before recently moving into their new roles in Big Tech.

Matt Taibbi reported that the companies began hiring former intelligence agents after the 2016 election when the FBI established its social media-focused task force, The Foreign Influence Task Force or FITF.

Since then, a massive “censorship-industrial complex” has grown up, Greenwald said, that includes the U.S. state, philanthropic foundations, “fact-checking” organizations, Big Tech, universities, think tanks, nonprofits and private contractors.

The ‘hallmark of totalitarianism’

But the most amazing part of this story, Greewnald said, is the lack of pushback by liberals, who used to be the primary critics of the security state. “Central to left liberal politics was the view that these agencies are nefarious,” he said. But that all changed with the Trump presidency:

“… in 2015, in 2016, the US Security state aligned itself against Donald Trump and devoted itself to sabotaging first the Trump campaign and then the Trump presidency.

“That’s where Russiagate came from. That’s where all of those scams came from, including the lie in 2020 if the Hunter Biden laptop was misinformation.”

And because there are now very few media outlets reporting critically on these agencies, he said, they are at “the peak of their power, more powerful than ever.”

Because of that, he said they are embedded in the biggest corporations that control information and propaganda in the U.S. — corporate media and Big Tech.

Greenwald concluded:

“This is why they’re so obsessed with destroying the few outposts of independent media, the few places they cannot control, because without those, they really do have a fully closed information system.

“And a fully closed information system is the hallmark of totalitarianism. If you can control how people think and prevent them from hearing dissent, you can control all of their actions because their actions are based in what their thoughts are.

“And if you can control their thoughts, you don’t even need to control their actions. And that is the system that is being created.”


Brenda Baletti Ph.D. is a reporter for The Defender. She wrote and taught about capitalism and politics for 10 years in the writing program at Duke University. She holds a Ph.D. in human geography from the University of North Carolina at Chapel Hill and a master’s from the University of Texas at Austin.

This article was originally published by The Defender — Children’s Health Defense’s News & Views Website under Creative Commons license CC BY-NC-ND 4.0. Please consider subscribing to The Defender or donating to Children’s Health Defense.

July 14, 2023 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Science and Pseudo-Science, Timeless or most popular, Video | , , , , , | 1 Comment