May 182017
 

A Timeline Of Events Surrounding The Russian Hack Narrative

An awesome timeline by reddit user RulerOfSlides:
Russia-Wiretapping hypotheses only timeline

I think I’ve got some of this worked out. The pieces are really starting to come together. First, what we learned recently:

  • Andrew McCabe gets manipulated/bribed into hiring a former MI6 agent to “research” (read: bullshit) the Trump dossier. Ties directly to the Clinton campaign (his wife received money from them or donated, iirc).
  • Hillary Clinton was confirmed to have access to intelligence and classified files after she left office as Secretary of State.
  • CrowdStrike recently redacted their statements that were used to support their claims of Russian interference in the election. They also were the only ones to look at the DNC’s servers; the FBI was prohibited to do so by the DNC itself.
  • Hillary Clinton and the head of CrowdStrike, Dimitri Alperovitch, were both ranking members of the Atlantic Council, a Soros-financed think tank.
  • Susan Rice requested that all intelligence relating to the Trumps (his whole family), gathered across a period of several years going back to 2013 (possibly earlier) be unmasked.
  • Jeh Johnson may also have been involved in unmasking Trump-related intelligence, but that connection is tenuous at best.
  • EDIT: I neglected to mention Evelyn Farkas, who accidentally disclosed the fact that the Obama administration had been spying on members of Trump’s campaign, as well as some of his friends is also a member of the Atlantic Council. She also had worked under the Clinton campaign since around 2015, and in her previous job dealt with Russia/Ukraine foreign policy.
  • EDIT II: Cernovich reported a few moments ago that three people close to Obama who had the authorization to unmask intelligence reports were Susan Rice, John Brennan, and Loretta Lynch – all three of whom were key players in the Russia narrative.
  • EDIT III: Developing possibility that Flynn and Trump may have cooperated to catch the spying apparatus/”Council of Evil” that Obama left behind, going off of a foreign intelligence tip. I have incorporated this into the timeline.
  • 4/3/2017 EDIT IV: Bloomberg now reporting on Rice’s unmasking efforts. The big takeaway here is that Nunes made a visit to the White House before his press conference to view the National Security Council systems that held the logs of Rice’s requests to unmask people that intelligence had been gathered on. I think this explains why Bannon was added to the NSC – Trump has eyes and ears in an area that he would otherwise have been blind to. It probably aided in gathering information about what was going on, too. (It’s also funny to see the media clinging to the literal definition of “wiretapping”). Adam Schiff also viewed these logs, hence his decided reluctance to properly comment on what was found.
  • 4/3/2017 EDIT V: Adding some small additional details that I uncovered from digging through the Podesta files. Podesta ID #34639, which better detectives than I concluded that this showed an effort at tying up Trump, Assange, and Russia. The screenshot is dead, sadly, but this happened in March 2016. Podesta ID #17020 also establishes a tenuous but still-present connection between Podesta and the Atlantic Council.
  • 4/4/2017 EDIT VI: As of a few hours ago, we now know slightly more about what happened with the fake Trump dossier. Steele was not paid directly by the FBI as originally speculated – that deal appears to have fallen through, but McCabe was closely involved in negotiating that payment, leaving the Clinton connection valid. The firm involved with it, Fusion GPS, began working on the dossier in September 2015, hired by an anti-Trump Republican donor. That deal was broken off some time after that, and then a Democratic supporter of Clinton started paying Fusion GPS to keep going, and this is the point where Steele was brought into the project.
  • 4/4/2017 EDIT VII: Contents of one of the Department of State emails (sent on November 21, 2009) recently declassified by the FBI indicate that Clinton’s infamous server was established to work around the intelligence-gathering systems that would later be used against President-elect Trump, or an ancestor to those systems. I unfortunately don’t remember who originally found this; I can’t be credited with this discovery – only integrating it into the timeline.
  • 4/5/2017 EDIT VIII: Apparently Susan Rice had a lot of friction with, of all the agencies, the NSA. One fellow ‘pede summarized this very nicely. I have a feeling that this gives Rogers adequate motive to go to Trump Tower about the unmasking on November 22 – she was horribly unpopular, possibly even coming to blows with Rogers himself.
  • 4/5/2017 EDIT IX: New information seems to implicate the one and only John Brennan as the man who ordered enhanced surveillance on key Trump allies, including General Flynn, Erik Prince (head of Blackwater and a top CIA critic), and Sean Hannity. Brennan was also the one to order Susan Rice to unmask those Trump allies. I’ve placed this in its rightful spot on the timeline.
  • 4/5/2017 EDIT X: Man, today is the gift that keeps on giving. Fox published an article describing that the intelligence reports involved here were uncomfortably detailed, but that’s not what I’m interested in. This report gives us a better understanding of when the unmasking campaign began, (concurrent with the Obama administration’s “investigation” into the DNC leaks) and tells us that only one agency would have the capability to fully trace back the paper trail that led back to Rice, as well as the fact that only one agency could approve unmasking requests – the NSA.
  • 4/6/2017 EDIT XI: Further information about Clinton’s continued access to classified material even after leaving her post as Secretary of State in 2013 has surfaced, for the purpose of “writing her memoir” (emphasis on air-quotes mine). Beyond Clinton, six staffers had access to the same classified intelligence. I have a feeling that the six people are on this list – specifically, the five people involved with management and strategy (Mook, Benenson, Renteria, Podesta, and Abedin) and Cheryl Mills. This would explain classified information ending up on Weiner’s laptop, and Mills’ request for partial immunity in the email investigation back in September.
  • 4/6/2017 EDIT XII: At the risk of making this seem implausible by not citing sources (who I’d like to keep private, though they are an active member of this community I have received permission to cite this source), it seems likely that Nunes discovered that he himself was unmasked by Brennan, McCabe, and/or Obama’s combined orders (there are three points where unmaskings were ordered, it would seem – by McCabe before the election, by Obama starting in December, and then again by Brennan after the new intelligence-dissemination rules went into effect in January) – that’s why he stepped away from the investigation. Nunes was on the Trump transition team as of December 1, 2016.
  • 4/8/2017 EDIT XIII: New Wikileaks release indicates that Guccifer 2.0, an individual supposedly responsible for leaking the DNC emails to Wikileaks (in addition to other doccuments) was neither Russian (with 97% certainty) and may have been a staffer named Warren Flood (or someone that stole his computer). Wikileaks does not indicate that the DNC knew Seth Rich was the leaker, however, because when Rich was discussed in Guccifer 2.0’s messages to a certain actress, he had been dead for over a month.
  • 4/12/2017 EDIT XIV: CNN accidentally admits (screenshot) that John Podesta had ties to Russia via the Podesta Group. The Podesta Group represents, among other things, the interests of Sberbank of Russia, which itself is owned by the Central Bank of Russia – which is part of the Russian government. The filing of the Podesta Group as a foreign agent is highly suspect on top of that. Perhaps the Russia narrative originated not out of revenge, but simply because the Clinton campaign (itself tied to Russia) assumed that Trump’s campaign was doing the exact same thing they were.
  • 4/18/2017 EDIT XV: I have been informed of an excellent summary of Obama-era wiretapping activities. Of note is that the single successful FISA request revolved around Carter Page’s alleged Russian connections, likely stemming from very close ties to the Russian government. This opened the door to Trump himself being officially spied on.
  • 4/18/2017 EDIT XVI: CNN accidentally admits, for the second time, more evil things. The Steele dossier was used by the FBI to justify FISA approval of surveillance of Carter Page. Bear in mind that Steele was under negotiation to be paid by Deputy Director McCabe for the dossier, and that Comey himself informed the Trump administration of what was in it. What does this mean? This means that the FBI knew it was full of shit (also why Steele was never paid), but it was still used in a court of law as evidence. Page is currently being leveraged because, being a Russian sympathizer, he is the weakest link in the Trump campaign and the most easily painted as a pro-Russian agent – and he was far removed from Trump’s inner circle. This is the length they had to go to to find some kind of Russian ties – faking evidence and hunting for Russian sympathizers, the latter of which was just found recently.
  • 4/23/2017 EDIT XVII: Kind of small, but still important – the Failing NYT confirmed that the FBI indeed attempted to pay Steele $50,000 for the dossier – if he could prove the claims in it. It appears that Carter Page’s visits to Moscow in 2016 – though they were innocuous, and though Page never met with Trump – were the legal foundation for much of the “Russian ties” claims (used for the FSIA request). The source of the Page-Russia connection, beyond Steele, was identified as Sergei Millian, a particularly shady Belarusian-American businessman. Page was also detested by the Trump campaign, and a cease-and-desist for calling himself a Trump advisor was sent to him in December 2016.
  • 4/25/2017 EDIT XVIII: Christopher Steele admitted that the claims in his dossier were 100% unverified. Apparently he’s going to court over the fact that the contents of the dossier were printed; there’s also some additional details of interest in here. The “hacker” that Steele claimed was involved in all this was Aleksej Gubarev, who runs a web-hosting company, XBT Holdings. Additionally, it seems that it was not Steele himself who released the dossier to the media; instead, Fusion GPS took it and leaked it to try and damage the Trump administration’s credibility. Steele did have less formal communications with the media, though. We now have a place for the meeting between Steele and the FBI – Rome, Italy, at some unknown time.
  • 5/13/2017 EDIT XIX: Big league news, if true. A Russian citizen has come forward and claimed that the FBI wanted to frame him for the DNC leaks, offering US citizenship and a dismissal of charges in return. The FBI apparently visited him several times – notably “mid-November” 2016, and February 7, 2017. He was arrested on unrelated charges on October 5, 2016. The relevant dates have been added.
  • 5/15/2017 EDIT XX: The family of Seth Rich hired a private investigator, who today announced that there is evidence he was in contact with Wikileaks prior to his death. There is evidence, too, that local police were told to step back from the investigation into his murder.
  • 5/17/2017 EDIT XXI: More information from one of the chans about Seth Rich. Also some potentially interesting deaths that occurred around the same timeframe – Joe Montano, the DNC chairman before Wasserman-Schultz and aide to Tim Kaine (July 25, 2016); and Shawn Lucas, head of a class-action lawsuit against Wasserman-Schultz for rigging the DNC primary (August 2, 2016).
  • 5/17/2017 EDIT XXII: Lucky timing on this. I was just about to go to bed, and happened across someone else on this domreddit linking Podesta email number 25651, which describes the best approach to stopping Trump as leveraging his “bromance with Putin.” This was sent by Brent Budowsky, a Huffington Post contributor and a writer for The Hill. Looks like Syria might have been one of the deciding factors on getting the Clinton campaign to turn against Russia. What is more significant is that this email was sent on December 21, 2015 – a whole three months before the earliest construction of the “Russian hacker” narrative.

My timeline, approximately:

  • EDIT XXII: The December 21, 2015 email exchange between Bret Budowsky and John Podesta occurs, touching upon ISIS and the continuation of Obama-era foreign policy surrounding Syria, in which Budowsky advises Podesta to make a departure from then-current policy for fear of it becoming political baggage. A notable quote: “But at the least she should not be branding and infecting herself with Obama’s policy towards Syria and ISIS by offering such high and direct praise for it.” I suspect this is the genesis of the Russia narrative, and the reason why the Clinton campaign went so far down the anti-Russia path.
  • The Obama administration most likely had been gathering intelligence on every GOP candidate – either as part of their expanded intel operations or as an intentional, focused sabotage plan. This information would likely have been contained in the President’s Daily Briefings, which Nunes is rumored to have investigated on March 22 – just before making the announcement that Trump’s wiretapping claims were correct. EDIT IV: Though Nunes may have viewed the President’s Daily Briefings at some point in his investigation, or intends to, it seems that the linchpin for Nunes was viewing the logs of Rice’s unmasking attempts.
  • Clinton got wind of this investigation through her ability to access intelligence files and other means (i.e., direct ties to people in DC who were active in intelligence-gathering). This is where the “Russian hacker” narrative began, possibly bolstered by her relationship with Alperovitch – who is a Russian expat and absolutely loathes Vladimir Putin. She may have built a narrative out of CrowdStrike’s report, hopeful that the intel-gathering by the Obama administration would uncover further information about Russian interference. EDIT: Evelyn Farkas, who had been involved in Russia/Ukraine affairs, may also have been involved with this, again through the Atlantic Council. EDIT V: Upon digging through the Podesta files, it would seem that the Trump/Russia connection narrative was constructed just before March 16, 2016. The Atlantic Council had a meeting about “combating far-right extremism in Europe” on March 22 – less than a week later. I think it’s possible that the Atlantic Council meeting on the 22nd was when the Clinton campaign, represented by John Podesta (who was in DC the day before the meeting, according to this – Clinton herself was in Washington state) exchanged information with CrowdStrike. EDIT VII: Since we can now establish that Clinton was aware of a covert spying system as far back as 2009, it’s possible that she counted on that same system to uncover some kind of Trump/Russia connection. EDIT XI: Now we also know that there’s a strong possibility that six of Clinton’s staffers also had access to classified intelligence – I wouldn’t be surprised if they were involved in dissemination, either.
  • On June 12, 2016, Julian Assange teases the release of the DNC’s emails, some three weeks after the latest possible date they could have been collected.
  • June 14, 2016 is the earliest date that has been connected to the official release of CrowdStrike’s report on the DNC “hack.” It may have been released the day after, too.
  • EDIT XIII: Guccifer 2.0 emerges onto the scene on June 15, 2016, and claims responsibility for the DNC hacks that were teased by Julian Assange barely three days earlier. Signs indicate that this may have been some kind of damage control by the DNC, coming off of the Podesta-Atlantic Council-CrowdStrike exchange that likely happened the previous month – basically, releasing “additional” information while lazily incorporating Russian “fingerprints” (i.e., writing the metadata in Cyrillic) into those releases as a means of shifting the blame to Russian influence. This is the second-earliest point at which “Russian ties” had been discussed publicly, and I have a feeling that the DNC took marching orders from the Clinton campaign (who had a discussion about Trump/Putin/Assange ties two months before, likely because they sensed a threat) in trying to sabotage Trump. Based off of some things that Guccifer 2.0 misinterpreted, it seems that he had zero connection to CrowdStrike’s report aside from reading it, so some insulation existed between the DNC and Clinton campaign.
  • EDIT XX: On July 10, 2016, Seth Conrad Rich, a DNC staffer, is murdered in Washington D.C.
  • On July 22, 2016, Wikileaks begins the release of 44,000 emails from the DNC spanning a period from January 2015 to May 25, 2016.
  • EDIT III: Oh boy. This – roughly July or August – is about the point at which, should the possibility laid out by Jonathan Langdale be correct (which Flynn’s apparent “thumb’s-up” lends extra credence to), Russia was responsible for approaching the Trump campaign and making them aware of the surveillance that was going on. Basically, Trump and Flynn laid out a trap for the “Council of Evil” (which I’ve come to call the Lynch/Rice/McCabe/Brennan/Clapper circle that seems to have been the main people involved with the Russia narrative) and the deep state, in which Flynn would be made to seem untrustworthy in order to draw out and embolden leakers. They couldn’t do anything about it, like go public with it, because it would jeopardize their chances of winning the election and thus prevent the campaign from investigating it further. Additionally, the FBI’s actions with Clinton made them seem untrustworthy; it was readily obvious as well that the DoJ was compromised after Bill’s infamous meeting with Lynch on the tarmac – meaning they had nowhere to turn but inwards.
  • CrowdStrike’s report, which formed the backbone of Russian hacking allegations, found its way through the three-letter agencies and eventually indirectly caused the last FISA request over a Trump-controlled server to go through. [EDIT III: This may have been motivated by Russia’s detection of Trump’s surveillance as hypothesized by Langdale] Several previous requests had been made, probably because the former (above EDIT III) bullet point happened in around June or July. The FBI found nothing while investigating it. EDIT II: Loretta Lynch’s ability to view unmasked intelligence documents may have played a role in allowing the FISA request to go through – likely as a way of building evidence for the brewing Russian hackers narrative.
  • EDIT XXI: On August 9, 2016, Wikileaks officially offers $20,000 for information about Seth Rich’s murder.
  • EDIT VI: At around this point, the funding for Fusion GPS to create the Trump dossier dries up, shifting away from the unknown Democrat. Clinton, fearing that the Russian hacking narrative is on shaky grounds, indirectly pays off Andrew McCabe to come up with some kind of dirt on Trump. McCabe then begins negotiating hiring Fusion GPS, who has brought Christopher Steele, a former MI6 agent, into their investigation. The money never makes it to Fusion GPS, and Steele spends several months “working” on it, sends it off to the mainstream media, and it floats around for several months until Buzzfeed publishes it as a means of undermining the Trump administration. Bear in mind that, by this point, the dossier had been in development for over a year.
  • McCabe believes Steele’s then-incomplete dossier, as well as CrowdStrike’s claims, and then begins to plan a soft overthrow of the Trump administration starting with the weakest link – Mike Flynn. Flynn is later forced out due to his own faults, [EDIT III: My original assumption here may be untrue, and this may have been part of a grander plan] but the assault doesn’t stop there. Comey may have been aware of McCabe’s actions, but ignored them. [EDIT XVII: This has been basically confirmed – the FBI knew of the dossier.]
  • EDIT XIX: Yevgeniy Nikulin, a Russian national, is arrested on October 5, 2016 by the Russian government over unrelated hacking charges (on the order of the US government). Two days later (October 7), the DNI (Clapper) and DHS (Jeh Johnson) jointly stated that Russia was behind the DNC server hack, as well as the Podesta leaks.
  • On October 7, 2016, Wikileaks begins releasing the Podesta emails, covering a period from approximately 2006 to March 21, 2016.
  • In the third Presidential debate on October 19, 2016 Clinton makes the first public accusation that “Russian hackers” interfered with the election.
  • This is about the point where the media begins to go crazy over the “Russian ties” allegations, bolstered in some form or another by the CrowdStrike claims, Steele’s dossier, and quite possibly leaks from McCabe’s anti-Trump crusade in a kind of Deep Throat Jr. situation. I have a suspicion that McCabe and his FBI-based allies (the “McCabe 16” mentioned in the True Pundit article) were the source of the narrative. EDIT II: The CIA under Brennan – because of his access to unmasked intelligence reports – may also have been involved with leaks to the media, especially via the Washington Post, which some have deemed the “mouthpiece of the CIA.”
  • On October 22, 2016, Gavin MacFayden – Seth Rich’s rumored contact at Wikileaks – dies of lung cancer in London. He had apparently been ill for quite some time (I personally don’t consider his death suspicious – only that it makes it harder to piece together the truth).
  • EDIT IX: This is approximately Election Day. If the anonymous sources are indeed correct, then this is the point at which CIA director John Brennan orders enhanced surveillance on people in Trump’s inner circle – like Mike Flynn (already targeted by the FBI under McCabe), Erik Prince, and Sean Hannity. He may have also provided Rice with the specific documents or directions to find them that were later disseminated at the Obama administration’s behest starting sometime in December. Flynn was chosen due to the ease at which he could be leveraged; Hannity was chosen due to his apparent close ties to both Trump and Julian Assange, and Prince may have been focused on due to a long-standing personal feud with Brennan. The enhanced surveillance continues from November 8 to January 20. Note as well that this failed to turn up anything of note, as Director Clapper left office on January 20 and reported on March 6, 2017 that no evidence of Trump-Russia ties existed. In other words, the enhanced surveillance failed.
  • EDIT XIX: Nikulin receives his first visit from the FBI in “mid-November,” mere days before John McCain learns of Steele’s dossier.
  • EDIT VI: Thanks to the Daily Caller, we now know that John McCain learned about the dossier at the Halifax International Security Forum, which took place between November 18 and November 20, 2016. The person involved in bringing it to his attention was Sir Andrew Wood. Wood was a former ambassador for the UK to Russia, and knew Steele from his time at MI6. I have a suspicion that the exact date the discussion about the dossier happened was November 19, because Wood was involved in a panel on “Maidan, Crimea and the Obstacles to Democracy in Ukraine” on that date according to the agenda. Wood flew back to the UK, met with Steele, and handed the dossier off to McCain between November 19 (the last date I can confirm with reasonable certainty Wood was present in Halifax) and December 9, when McCain gave the dossier to James Comey during a meeting. Comey then briefed Trump on the existence of the dossier – which suggests to me that he was unaware of McCabe’s actions in trying to hire Fusion GPS – and once that meeting became known to the press, BuzzFeed published the complete dossier. EDIT XVI: Now we know that Steele’s dossier, likely the complete version handed to Comey, was used to bolster the FBI’s FISA request. Highly suspicious, and indicates the document was laundered.
  • EDIT X: Early December 2016. The Obama administration announces the beginning of an investigation into the DNC hacks, and the requests for unmasked intelligence reports relating to this begin at around this point. I think it’s likely that someone higher-up than Susan Rice ordered the unmasking, as the aforementioned paper trail through the NSA would have been immediately suspicious to the incoming Trump administration. This may also explain Rogers’ visit to Trump Tower, as unmasking in a less official manner had been going on for many months up to this point – this would merely be the latest effort to direct it at the Trump administration. I suspect the higher-up who ordered Rice to do this was most likely John Brennan; he intended Rice to be his fall guy when Trump caught up to what was going on.
  • The real unmasking begins once Obama amends EO 12333 to encourage free sharing of information between the three-letter agencies, on January 12. The new rules were signed by Clapper on December 15, so it’s reasonable to assume they had been floating around for a decently long time before that. Less than a month before Clapper agrees to them, NSA head Admiral Rogers visits Trump in an infamous “unscheduled meeting,” which draws ire from the rest of the intelligence community. It’s obvious at this point that this was in order to warn the new administration of what was going on behind closed doors, likely including the information sharing.
  • Susan Rice orders the unmasking of all Trump-related intelligence at some point after the information sharing rules go into effect. This allowed intelligence previously collected on Trump and his family to be widely disseminated between the FBI, CIA, and NSA, and thus exponentially increased the chances of leakers spreading that information to the press – which can (and did) happen. McCabe was involved in this due to his desire to force Flynn and then Trump out of office. Jeh Johnson may also have been involved in the unmasking process as well, but it’s unclear as to what his position was.
  • EDIT III: The trap from before the election was set; Flynn volunteered to be the fall guy as already a kind of black sheep in the administration (by being the sole Democrat), and he baited the intelligence community into going after him just before the new inter-agency intelligence sharing rules took effect. It worked like a charm – the media latched on to it, and Flynn handed Trump his resignation letter as the whole intelligence community fell for it hook, line, and sinker. It was now obvious who the leakers were and where they were coming from.
  • EDIT XIX: Nikulin receives his second visit from the FBI on February 7, 2017. Note that this happened after the unmasking scandal began falling apart in the waining days of the Obama administration.
  • EDIT II: Cernovich revealed tonight that H. R. McMaster was responsible for discovering Rice’s actions, and he was responsible for sending an aide to Nunes in order to blow the lid open on what was going on. This happened between February 20 (when he assumed office) and March 22 (when Nunes held his press conference). EDIT III: Flynn, it should be noted, resigned seven days before McMaster took office; I don’t think it’s a coincidence that he uncovered what Rice was doing in just over a month – Flynn’s dismissal drew all the termites out of the woodwork, and emboldened them in attempting to leak new, “damaging” information. The only effect this had was to highlight the leakers.
  • The White House figures out all of this, or some key portions of this, between January 20 and March 4. Thus follows Trump’s series of tweets discussing “wiretapping,” and the rest is history. EDIT IV: It wasn’t until early March that Rice was pinned down as the unmasker by lawyers at the White House, so I tend to think that Trump reported on “wiretapping” almost as soon as the smoking gun was found.

 
 
Source…

May 012017
 

The CIA tried to turn a CAT into a cyborg spy by implanting it with a microphone and antenna

The CIA Implanted Microphones Into The Skin Of CATS

The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia.

The cat had a microphone, antenna and battery pack surgically embedded into its skin so the feline could act as a covert recording device.

Recently declassified documents show how the scientists responsible for the cruel research were praised by spy chiefs for their ‘pioneering’ work.

Acoustic Kitty

The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia. Declassified documents reveal that the work was praised by CIA chiefs as a ‘remarkable scientific achievement’

The strange eavesdropping technique, though never used in the field, resurfaced this week when WikiLeaks tweeted a link to declassified CIA memos, first released in 2001.

The research was dubbed ‘Project Acoustic Kitty’ and cost $13 million (£10 million) over its five-year development in the 1960s.

The cat’s tail was used as an antenna with a wire travelling all the way up its spine to a microphone in the animal’s ear.

The equipment’s battery pack was sewn into the cat’s chest.

Victor Marchetti, a former CIA officer, told The Telegraph that year of the gruesome creation.

He said: ‘They slit the cat open, put batteries in him, wired him up’.

‘They made a monstrosity. They tested him and tested him.

‘They found he would walk off the job when he got hungry, so they put another wire in to override that,’ he added.

The final 1967 report on the project concluded it was non-practical, signalling the end of the research.

But the memo hailed the ‘remarkable scientific achievement’ reached by the American spy agency.

‘The work done on this problem over the years reflects great credit on the personnel who guided it,’ the document concluded.


The cats had microphones, antennae and battery packs surgically embedded into their skin so the felines could act as covert recording devices.

 
 
via

25 Ways To Suppress Truth: The Rules of Disinformation

 Political  Comments Off on 25 Ways To Suppress Truth: The Rules of Disinformation
Apr 262017
 

These 25 ways are everywhere in media, from political debates, to television shows, to comments on social media.

25 Ways To Suppress Truth: The Rules of Disinformation

Built upon Thirteen Techniques for Truth Suppression by David Martin, the following may be useful to the initiate in the world of dealing with veiled and half-truth, lies, and suppression of truth when serious crimes are studied in public forums. This, sadly, includes every day news media, one of the worst offenders with respect to being a source of disinformation. Where the crime involves a conspiracy, or a conspiracy to cover up the crime, there will invariably be a disinformation campaign launched against those seeking to uncover and expose the truth and/or the conspiracy. There are specific tactics which disinfo artists tend to apply, as revealed here. Also included with this material are seven common traits of the disinfo artist which may also prove useful in identifying players and motives. The more a particular party fits the traits and is guilty of following the rules, the more likely they are a professional disinfo artist with a vested motive. People can be bought, threatened, or blackmailed into providing disinformation, so even “good guys” can be suspect in many cases.

A rational person participating as one interested in the truth will evaluate that chain of evidence and conclude either that the links are solid and conclusive, that one or more links are weak and need further development before conclusion can be arrived at, or that one or more links can be broken, usually invalidating (but not necessarily so, if parallel links already exist or can be found, or if a particular link was merely supportive, but not in itself key) the argument. The game is played by raising issues which either strengthen or weaken (preferably to the point of breaking) these links. It is the job of a disinfo artist to interfere with these evaluation… to at least make people think the links are weak or broken when, in truth, they are not… or to propose alternative solutions leading away from the truth. Often, by simply impeding and slowing down the process through disinformation tactics, a level of victory is assured because apathy increases with time and rhetoric.

It would seem true in almost every instance, that if one cannot break the chain of evidence for a given solution, revelation of truth has won out. If the chain is broken either a new link must be forged, or a whole new chain developed, or the solution is invalid an a new one must be found… but truth still wins out. There is no shame in being the creator or supporter of a failed solution, chain, or link, if done with honesty in search of the truth. This is the rational approach. While it is understandable that a person can become emotionally involved with a particular side of a given issue, it is really unimportant who wins, as long as truth wins. But the disinfo artist will seek to emotionalize and chastise any failure (real or false claims thereof), and will seek by means of intimidation to prevent discussion in general.

Twenty-Five Rules of Disinformation
  1. Hear no evil, see no evil, speak no evil
  2. Become incredulous and indignant
  3. Create rumor mongers
  4. Use a straw man
  5. Sidetrack opponents w name calling, ridicule
  6. Hit and Run
  7. Question motives
  8. Invoke authority
  9. Play Dumb
  10. Associate opponent charges with old news
  11. Establish and rely upon fall-back positions
  12. Enigmas have no solution
  13. Alice in Wonderland Logic
  14. Demand complete solutions
  15. Fit the facts to alternate conclusions
  16. Vanish evidence and witnesses
  17. Change the subject
  18. Emotionalize, Antagonize, and Goad
  19. Ignore facts, demand impossible proofs
  20. False evidence
  21. Call a Grand Jury, Special Prosecutor
  22. Manufacture a new truth
  23. Create bigger distractions
  24. Silence critics
  25. Vanish
Eight Traits of The Disinformationalist
  1. Avoidance
  2. Selectivity
  3. Coincidental
  4. Teamwork
  5. Anti-conspiratorial
  6. Artificial Emotions
  7. Inconsistent
  8. Newly Discovered: Time Constant

It is the disinfo artist and those who may pull their strings (those who stand to suffer should the crime be solved) MUST seek to prevent rational and complete examination of any chain of evidence which would hang them. Since fact and truth seldom fall on their own, they must be overcome with lies and deceit. Those who are professional in the art of lies and deceit, such as the intelligence community and the professional criminal (often the same people or at least working together), tend to apply fairly well defined and observable tools in this process. However, the public at large is not well armed against such weapons, and is often easily led astray by these time-proven tactics. Remarkably, not even media and law enforcement have NOT BEEN TRAINED to deal with these issues. For the most part, only the players themselves understand the rules of the game.

This why concepts from the film, Wag-The-Dog, actually work. If you saw that movie, know that there is at least one real-world counterpart to Al Pacino’s character. For CIA, it is Mark Richards, who was called in to orchestrate the media response to Waco on behalf of Janet Reno. Mark Richards is the acknowledged High Priest of Disinformation. His appointment was extremely appropriate, since the CIA was VERY present at Waco from the very beginning of the cult to the very end of their days — just as it was at the People’s Temple in Jonestown. Richards purpose in life is damage control.

For such disinformationalists, the overall aim is to avoid discussing links in the chain of evidence which cannot be broken by truth, but at all times, to use clever deceptions or lies to make select links seem weaker than they are, create the illusion of a break, or better still, cause any who are considering the chain to be distracted in any number of ways, including the method of questioning the credentials of the presenter. Please understand that fact is fact, regardless of the source. Likewise, truth is truth, regardless of the source. This is why criminals are allowed to testify against other criminals. Where a motive to lie may truly exist, only actual evidence that the testimony itself IS a lie renders it completely invalid. Were a known ‘liar’s’ testimony to stand on its own without supporting fact, it might certainly be of questionable value, but if the testimony (argument) is based on verifiable or otherwise demonstrable facts, it matters not who does the presenting or what their motives are, or if they have lied in the past or even if motivated to lie in this instance — the facts or links would and should stand or fall on their own merit and their part in the matter will merely be supportive.

Moreover, particularly with respects to public forums such as newspaper letters to the editor, and Internet chat and news groups, the disinfo type has a very important role. In these forums, the principle topics of discussion are generally attempts by individuals to cause other persons to become interested in their own particular position, idea, or solution — very much in development at the time. People often use such mediums as a sounding board and in hopes of pollination to better form their ideas. Where such ideas are critical of government or powerful, vested groups (especially if their criminality is the topic), the disinfo artist has yet another role — the role of nipping it in the bud. They also seek to stage the concept, the presenter, and any supporters as less than credible should any possible future confrontation in more public forums result due to their early successes. You can often spot the disinfo types at work here by the unique application of “higher standards” of discussion than necessarily warranted. They will demand that those presenting arguments or concepts back everything up with the same level of expertise as a professor, researcher, or investigative writer. Anything less renders any discussion meaningless and unworthy in their opinion, and anyone who disagrees is obviously stupid — and they generally put it in exactly those terms.

So, as you read any such discussions, particularly so in Internet news groups (NG), decide for yourself when a rational argument is being applied and when disinformation, psyops (psychological warfare operations) or trickery is the tool. Accuse those guilty of the later freely. They (both those deliberately seeking to lead you astray, and those who are simply foolish or misguided thinkers) generally run for cover when thus illuminated, or — put in other terms, they put up or shut up (a perfectly acceptable outcome either way, since truth is the goal.) Here are the twenty-five methods and seven traits, some of which don’t apply directly to NG application. Each contains a simple example in the form of actual (some paraphrased for simplicity) from NG comments on commonly known historical events, and a proper response. Accusations should not be overused — reserve for repeat offenders and those who use multiple tactics. Responses should avoid falling into emotional traps or informational sidetracks, unless it is feared that some observers will be easily dissuaded by the trickery. Consider quoting the complete rule rather than simply citing it, as others will not have reference. Offer to provide a complete copy of the rule set upon request (see permissions statement at end):

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

(1) Hear No Evil, See No Evil, Speak No Evil

Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

Example: Media was present in the courtroom (Hunt vs. Liberty Lobby) when CIA agent Marita Lorenz ‘confession’ testimony regarding CIA direct participation in the planning and assassination of John Kennedy was revealed. All media reported was that E. Howard Hunt lost his libel case against Liberty Lobby (Liberty Lobby’s newspaper, The Spotlight, had reported Hunt was in Dallas that day and were sued for the story). See Mark Lane’s remarkable book, Plausible Denial, for the full confessional transcript.

Proper response: There is no possible response unless you are aware of the material and can make it public yourself.. In any such attempt, be certain to target any known silent party as likely complicit in a cover up. In this case, it would be the entire Time-Warner Media Group, among others. This author is relatively certain that reporters were hand-picked to cover this case from among those having intelligence community ties.

(2) Become Incredulous and Indignant

Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

Example: ‘How dare you suggest that the Branch Davidians were murdered! the FBI and BATF are made up of America’s finest and best trained law enforcement, operate under the strictest of legal requirements, and are under the finest leadership the President could want to appoint.’

Proper response: You are avoiding the Waco issue with disinformation tactics. Your high opinion of FBI is not founded in fact. All you need do is examine Ruby Ridge and any number of other examples, and you will see a pattern of abuse of power that demands attention to charges against FBI/BATF at Waco. Why do you refuse to address the issues with disinformation tactics (rule 2 – become incredulous and indignant)?

(3) Create Rumor Mongers

Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

‘You can’t prove his material was legitimately from French Intelligence. Pierre Salinger had a chance to show his ‘proof’ that flight 800 was brought down by friendly fire, and he didn’t. All he really had was the same old baseless rumor that’s been floating around the Internet for months.’

Proper response: You are avoiding the issue with disinformation tactics. The Internet charge reported widely is based on a single FBI interview statement to media and a similar statement by a Congressman, neither of which had actually seen Pierre’s document. As the FBI is being accused in participating in a cover up of this matter and Pierre claims his material is not Internet sourced, it is natural that FBI would have reason to paint his material in a negative light. For you to assume the FBI to have no bias in the face of Salinger’s credentials and unchanged stance suggests you are biased. At the best you can say the matter is in question. Further, to imply that material found on Internet is worthless is not founded. At best you may say it must be considered carefully before accepting it, which will require addressing the actual issues. Why do you refuse to address these issues with disinformation tactics (rule 3 – create rumor mongers)?

(4) Use a Straw Man

Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

Example: When trying to defeat reports by the Times of London that spy-sat images reveal an object racing towards and striking flight 800, a straw man is used. The disinformationalist, later identified as having worked for Naval Intelligence, simply stated: ‘If these images exist, the public has not seen them. Why? They don’t exist, and never did. You have no evidence and thus, your entire case falls flat.’

Proper response: ‘You are avoiding the issue with disinformation tactics. You imply deceit and deliberately establish an impossible and unwarranted test. It is perfectly natural that the public has not seen them, nor will they for some considerable time, if ever. To produce them would violate national security with respect to intelligence gathering capabilities and limitations, and you should know this. Why do you refuse to address the issues with such disinformation tactics (rule 4 – use a straw man)?’

(5) Sidetrack Opponents with Name-Calling and Ridicule

This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

Example: ‘You believe what you read in the Spotlight? The Publisher, Willis DeCarto, is a well-known right-wing racist. I guess we know your politics — does your Bible have a swastika on it? That certainly explains why you support this wild-eyed, right-wing conspiracy theory.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply guilt by association and attack truth on the basis of the messenger. The Spotlight is well known Populist media source responsible for releasing facts and stories well before mainstream media will discuss the issues through their veil of silence. Willis DeCarto has successfully handled lawsuits regarding slanderous statements such as yours. Your undemonstrated charges against the messenger have nothing to do with the facts or the issues, and fly in the face of reason. Why do you refuse to address the issues by use of such disinformation tactics (rule 5 – sidetrack opponents with name calling and ridicule)?’

(6) Hit and Run

In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

Example: ”This stuff is garbage. Where do you conspiracy lunatics come up with this crap? I hope you all get run over by black helicopters.’ Notice it even has a farewell sound to it, so it won’t seem curious if the author is never heard from again.

Proper response: ‘You are avoiding the issue with disinformation tactics. Your comments or opinions fail to offer any meaningful dialog or information, and are worthless except to pander to emotionalism, and in fact, reveal you to be emotionally insecure with these matters. If you do not like reading ‘this crap’, why do you frequent this NG which is clearly for the purpose of such discussion? Why do you refuse to address the issues by use of such disinformation tactics (rule 6 – hit and run)?’

(7) Question Motives

Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

Example: ‘With the talk-show circuit and the book deal, it looks like you can make a pretty good living spreading lies.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply guilt as a means of attacking the messenger or his credentials, but cowardly fail to offer any concrete evidence that this is so. If you think what has been presented are ‘lies’, why not simply so illustrate? Why do you refuse to address the issues by use of such disinformation tactics (rule 6 – question motives)?’

(8) Invoke Authority

Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

‘You obviously know nothing about either the politics or strategic considerations, much less the technicals of the SR-71. Incidentally, for those who might care, that sleek plane is started with a pair of souped up big-block V-8’s (originally, Buick 454 C.I.D. with dual 450 CFM Holly Carbs and a full-race Isky cams — for 850 combined BHP @ 6,500 RPM) using a dragster-style clutch with direct-drive shaft. Anyway, I can tell you with confidence that no Blackbird has ever been flown by Korean nationals nor have they ever been trained to fly it, and have certainly never overflown the Republic of China in a SR or even launched a drone from it that flew over China. I’m not authorized to discuss if there have been overflights by American pilots.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply your own authority and expertise but fail to provide credentials, and you also fail to address issues and cite sources. You simply cite ‘Jane’s-like’ information to make us think you know what you are talking about. Why do you refuse to address the issues by use of such disinformation tactics (rule 8 – invoke authority)?’

(9) Play Dumb

No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

Example: ‘Nothing you say makes any sense. Your logic is idiotic. Your facts nonexistent. Better go back to the drawing board and try again.’

Proper response: ‘You are avoiding the issue with disinformation tactics. You evade the issues with your own form of nonsense while others, perhaps more intelligent than you pretend to be, have no trouble with the material. Why do you refuse to address the issues by use of such disinformation tactics (Rule 9 – play dumb)?’

(10) Associate Opponent Charges with Old News

A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

Example: ‘Flight 553’s crash was pilot error, according to the NTSB findings. Digging up new witnesses who say the CIA brought it down at a selected spot and were waiting for it with 50 agents won’t revive that old dead horse buried by NTSB more than twenty years ago.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your ignore the issues and imply they are old charges as if new information is irrelevant to truth. Why do you refuse to address the issues by use of such disinformation tactics (rule 10 – associate charges with old news)?’

(11) Establish and Rely Upon Fall-Back Positions

Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

Example: ‘Reno admitted in hindsight she should have taken more time to question the data provided by subordinates on the deadliness of CS-4 and the likely Davidian response to its use, but she was so concerned about the children that she elected, in what she now believes was a sad and terrible mistake, to order the tear gas be used.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your evade the true issue by focusing on a side issue in an attempt to evoke sympathy. Perhaps you did not know that CIA Public Relations expert Mark Richards was called in to help Janet Reno with the Waco aftermath response? How warm and fuzzy it makes us feel, so much so that we are to ignore more important matters being discussed. Why do you refuse to address the issues by use of such disinformation tactics (rule 11 – establish and rely upon fall-back positions)?’

(12) Enigmas Have No Solution

Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.

Example: ‘I don’t see how you can claim Vince Foster was murdered since you can’t prove a motive. Before you could do that, you would have to completely solve the whole controversy over everything that went on in the White House and in Arkansas, and even then, you would have to know a heck of a lot more about what went on within the NSA, the Travel Office, and the secret Grand Jury, and on, and on, and on. It’s hopeless. Give it up.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your completely evade issues and attempt others from daring to attempt it by making it a much bigger mountain than necessary. You eat an elephant one bite at a time. Why do you refuse to address the issues by use of such disinformation tactics (rule 12 – enigmas have no solution)?’

(13) Alice in Wonderland Logic 

Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

Example: ‘The news media operates in a fiercely competitive market where stories are gold. This means they dig, dig, dig for the story — often doing a better job than law enforcement. If there was any evidence that BATF had prior knowledge of the Oklahoma City bombing, they would surely have uncovered it and reported it. They haven’t reported it, so there can’t have been any prior knowledge. Put up or shut up.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your backwards logic does not work here. Has media reported CIA killed Kennedy when they knew it? No, despite their presence at a courtroom testimony ‘confession’ by CIA operative Marita Lornez in a liable trial between E. Howard Hunt and Liberty Lobby, they only told us the trial verdict. THAT, would have been the biggest story of the Century, but they didn’t print it, did they? Why do you refuse to address the issues by use of such disinformation tactics (rule 13 – Alice in Wonderland logic)?’

(14) Demand Complete Solutions 

Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

Example: ‘Since you know so much, if James Earl Ray is as innocent as you claim, who really killed Martin Luther King, how was it planned and executed, how did they frame Ray and fool the FBI, and why?’

Proper response: You are avoiding the issue with disinformation tactics. It is not necessary to completely resolve any full matter in order to examine any relative attached issue. Discussion of any evidence of Ray’s innocence can stand alone to serve truth, and any alternative solution to the crime, while it may bolster that truth, can also stand alone. Why do you refuse to address the issues by use of such disinformation tactics (rule 14 – demand complete solutions)?

(15) Fit the Facts to Alternate Conclusions

This requires creative thinking unless the crime was planned with contingency conclusions in place.

Example: ‘The cargo door failed on Flight 800 and caused a catastrophic breakup which ruptured the fuel tank and caused it to explode.’

Proper response: The best definitive example of avoiding issues by this technique is, perhaps, Arlan Specter’s Magic Bullet from the Warren Report. This was eloquently defeated in court but media blindly accepted it without challenge. Thus rewarded, disinformationalists do not shrink from its application, even though today, thanks in part to the movie, JFK, most Americans do now understand it was fabricated nonsense. Thus the defense which works best may actually be to cite the Magic Bullet. ‘You are avoiding the issue with disinformation tactics. Your imaginative twisting of facts rivals that of Arlan Specter’s Magic Bullet in the Warren Report. We all know why the impossible magic bullet was invented. You invent a cargo door problem when there has been not one shred of evidence from the crash investigation to support it, and in fact, actual photos of the cargo door hinges and locks disprove you. Why do you refuse to address the issues by use of such disinformation tactics (rule 15 – fit facts to an alternate conclusion)?’

(16) Vanish Evidence and Witnesses

If it does not exist, it is not fact, and you won’t have to address the issue.

Example: ‘You can’t say Paisley is still alive… that his death was faked and the list of CIA agents found on his boat deliberately placed there to support a purge at CIA. You have no proof. Why can’t you accept the Police reports?’ This is a good ploy, since the dental records and autopsy report showing his body was two inches too long and the teeth weren’t his were lost right after his wife demanded inquiry, and since his body was cremated before she could view it — all that remains are the Police Reports. Handy.

Proper response: There is no suitable response to actual vanished materials or persons, unless you can shed light on the matter, particularly if you can tie the event to a cover up other criminality. However, with respect to dialog where it is used against the discussion, you can respond… ‘You are avoiding the issue with disinformation tactics. The best you can say is that the matter is in contention ONLY because of highly suspicious matters such as the simultaneous and mysterious vanishing of three sets of evidence. The suspicious nature itself tends to support the primary allegation. Why do you refuse to address the remaining issues by use of such disinformation tactics (rule 16 – vanish evidence and witnesses)?’

(17) Change the Subject

Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

Example: ‘There were no CIA drugs and was no drug money laundering through Mena, Arkansas, and certainly, there was no Bill Clinton knowledge of it because it simply didn’t happen. This is merely an attempt by his opponents to put Clinton off balance and at a disadvantage in the election: Dole is such a weak candidate with nothing to offer that they are desperate to come up with something to swing the polls. Dole simply has no real platform.’ Assistant’s response. ‘You idiot! Dole has the clearest vision of what’s wrong with Government since McGovern. Clinton is only interested in raping the economy, the environment, and every woman he can get his hands on…’ One naturally feels compelled, regardless of party of choice, to jump in defensively on that one…

Proper response: ‘You are both avoiding the issue with disinformation tactics. Your evade discussion of the issues by attempting to sidetrack us with an emotional response to a new topic — a trap which we will not fall into willingly. If you truly believe such political rhetoric, please drop out of this discussion, as it is not germane, and take it to one of the more appropriate politics NGs. Why do you refuse to address the issues by use of such disinformation tactics (rule 17- change the subject)?’

(18) Emotionalize, Antagonize, and Goad Opponents

If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

Example: ‘You are such an idiot to think that possible — or are you such a paranoid conspiracy buff that you think the ‘gubment’ is cooking your pea-brained skull with microwaves, which is the only justification you might have for dreaming up this drivel.’ After a drawing an emotional response: ‘Ohhh… I do seem to have touched a sensitive nerve. Tsk, tsk. What’s the matter? The truth too hot for you to handle? Perhaps you should stop relying on the Psychic Friends Network and see a psychiatrist for some real professional help…’

Proper response: ‘You are avoiding the issue with disinformation tactics. You attempt to draw me into emotional response without discussion of the issues. If you have something useful to contribute which defeats my argument, let’s here it — preferably without snide and unwarranted personal attacks, if you can manage to avoid sinking so low. Your useless rhetoric serves no purpose here if that is all you can manage. Why do you refuse to address the issues by use of such disinformation tactics (rule 18 – emotionalize, antagonize, and goad opponents)?’

(19) Ignore Proof Presented, Demand Impossible Proofs

This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

Example: ‘All he’s done is to quote the liberal media and a bunch of witnesses who aren’t qualified. Where’s his proof? Show me wreckage from flight 800 that shows a missile hit it!’

Proper response: ‘You are avoiding the issue with disinformation tactics. You presume for us not to accept Don Phillips, reporter for the Washington Post, Al Baker, Craig Gordon or Liam Pleven, reporters for Newsday, Matthew Purdy or Matthew L. Wald, Don Van Natta Jr., reporters for the New York Times, or Pat Milton, wire reporter for the Associated Press — as being able to tell us anything useful about the facts in this matter. Neither would you allow us to accept Robert E. Francis, Vice Chairman of the NTSB, Joseph Cantamessa Jr., Special Agent In Charge of the New York Office of the F.B.I., Dr. Charles Wetli, Suffolk County Medical Examiner, the Pathologist examining the bodies, nor unnamed Navy divers, crash investigators, or other cited officials, including Boeing Aircraft representatives a part of the crash investigative team — as a qualified party in this matter, and thus, dismisses this material out of hand. Good logic, — about as good as saying 150 eye witnesses aren’t qualified. Then you demand us to produce evidence which you know is not accessible to us, evidence held by FBI, whom we accuse of cover up. Thus, only YOU are qualified to tell us what to believe? Witnesses be damned? Radar tracks be damned? Satellite tracks be damned? Reporters be damned? Photographs be damned? Government statements be damned? Is there a pattern here?. Why do you refuse to address the issues by use of such disinformation tactics (rule 19 – ignore proof presented, demand impossible proofs)?’

(20) False Evidence

Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

Example: Jack Ruby warned the Warren Commission that the white Russian separatists, the Solidarists, were involved in the assassination. This was a handy ‘confession’, since Jack and Earl were both on the same team in terms of the cover up, and since it is now known that Jack worked directly with CIA in the assassination (see below.)

Proper response: This one can be difficult to respond to unless you see it clearly, such as in the following example, where more is known today than earlier in time… ‘You are avoiding the issue with disinformation tactics. Your information is known to have been designed to side track this issue. As revealed by CIA operative Marita Lorenz under oath offered in court in E. Howard Hunt vs. Liberty Lobby, CIA operatives E. Howard Hunt, James McCord, and others, met with Jack Ruby in Dallas the night before the assassination of JFK to distribute guns and money. Clearly, Ruby was a coconspirator whose ‘Solidarist confession’ was meant to sidetrack any serious investigation of the murder AWAY from CIA. Why do you refuse to address the issues by use of such disinformation tactics (rule 20 – false evidence)?’

(21) Call a Grand Jury, Special Prosecutor, or Other Empowered Investigative Body

Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

Example: According to one OK bombing Federal Grand Juror who violated the law to speak the truth, jurors were, contrary to law, denied the power of subpoena of witness of their choosing, denied the power of asking witnesses questions of their choosing, and relegated to hearing only evidence prosecution wished them to hear, evidence which clearly seemed fraudulent and intended to paint conclusions other than facts actually suggested.

Proper response: There is usually no adequate response to this tactic except to complain loudly at any sign of its application, particularly with respect to any possible cover up. This happened locally in Oklahoma, and as a result, a new Grand Jury has been called to rehear evidence that government officials knew in advance that the bombing was going to take place, and a number of new facts which indicate it was impossible for Timothy McVeigh to have done the deed without access to extremely advanced explosive devices such as available ONLY to the military or intelligence community, such as CIA’s METC technology. Media has refused to cover the new Oklahoma Grand Jury process, by they way.

(22) Manufacture a New Truth

Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

Example: The False Memory Syndrome Foundation and American Family Foundation and American and Canadian Psychiatric Associations fall into this category, as their founding members and/or leadership include key persons associated with CIA Mind Control research. Read The Professional Paranoid or Phsychic Dictatorship in the U.S.A. by Alex Constantine for more information. Not so curious, then, that (in a perhaps oversimplified explanation here) these organizations focus on, by means of their own “research findings”, that there is no such thing as Mind Control.

Proper response: Unless you are in a position to be well versed in the topic and know of the background and relationships involved in the opponent organization, you are not well equipped to fight this tactic.

(23) Create Bigger Distractions

If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

Example: To distract the public over the progress of a WTC bombing trial that seems to be uncovering nasty ties to the intelligence community, have an endless discussion of skaters whacking other skaters on the knee. To distract the public over the progress of the Waco trials that have the potential to reveal government sponsored murder, have an O.J. summer. To distract the public over an ever disintegrating McVeigh trial situation and the danger of exposing government involvements, come up with something else (Flight 800?) to talk about — or, keeping in the sports theme, how about sports fans shooting referees and players during a game and the focusing on the whole gun control thing?

Proper response: The best you can do is attempt to keep public debate and interest in the true issues alive and point out that the ‘news flap’ or other evasive tactic serves the interests of your opponents.

(24) Silence Critics

If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

Example: As experienced by certain proponents of friendly fire theories with respect to flight 800 — send in FBI agents to intimidate and threaten that if they persisted further they would be subject to charges of aiding and abetting Iranian terrorists, of failing to register as a foreign agents, or any other trumped up charges. If this doesn’t work, you can always plant drugs and bust them.

Proper response: You have three defensive alternatives if you think yourself potential victim of this ploy. One is to stand and fight regardless. Another is to create for yourself an insurance policy which will point to your opponents in the event of any unpleasantness, a matter which requires superior intelligence information on your opponents and great care in execution to avoid dangerous pitfalls (see The Professional Paranoid by this author for suggestions on how this might be done). The last alternative is to cave in or run (same thing.)

(25) Vanish

If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Example: Do a Robert Vesco and retire to the Caribbean. If you don’t, somebody in your organization may choose to vanish you the way of Vince Foster or Ron Brown.

Proper response: You will likely not have a means to attack this method, except to focus on the vanishing in hopes of uncovering it was by foul play or deceit as part of a deliberate cover up.

 

 
via

Declassified CIA Document Reveals Plan To Destroy Syria For Oil Pipeline

 Political  Comments Off on Declassified CIA Document Reveals Plan To Destroy Syria For Oil Pipeline
Apr 122017
 

A CIA document from the early 1980s details a US plan to destroy Syria — in much the same way the United States has been doing for the last few years.

Declassified CIA Document Reveals Plan To Destroy Syria For Oil Pipeline

Geostrategically crucial Syria has been at the center of a decades-long plot by the United States to depose the sovereign government and install one supportive of goals in the Middle East must be revisited — and quickly — before the beating of war drums drowns out the truth of our government’s recently-espoused mission.

President Donald Trump has repeatedly castigated President Bashar al-Assad for ordering a gruesome mass killing of civilians with chemical weapons in Khan Sheikhoun. This accusation sparked a bolstering of support for the Syrian regime from both Moscow and Tehran.

“Syria at present has a hammerlock on US interests both in Lebanon and in the Gulf — through closure of Iraq’s pipeline thereby threatening Iraqi internationalization of the war. The US should consider sharply escalating the pressures against Assad through covertly orchestrating simultaneous military threats against Syria from three border states hostile to Syria: Iraq, Israel and Turkey.”

While the preceding bears the names of leaders and nations familiar to current headlines, that assessment, cogently titled, “Bringing Real Muscle to Bear Against Syria,” from former CIA officer Graham Fuller in actuality discusses Syria under Assad’s predecessor — his father, Hafez al-Assad — and is dated September 14, 1983, amid the Iran-Iraq War.

CIA-RDP88B00443R001404090133-0

 
Fuller’s analysis, points out Activist Post’s Brandon Turbeville, evinces Assad as a nuisance hindering American empire’s lust to control vast fossil fuel stores and protect ally, Israel, against multiple threats in the Middle East. Destabilization of Iraq and Iran also features prominently in the intricate U.S. plan to deal with the irritant, elder Assad — who, incidentally, recognized Western ulterior motives for what they were.

As the six-page document continues,

Syria continues to maintain a hammerlock on two key U.S. interests in the Middle East:

— Syrian refusal to withdraw its troops from Lebanon ensures Israeli occupation in the south;

— Syrian closure of the Iraqi pipeline has been a key factor in bringing Iraq to its financial knees, impelling it towards dangerous internationalization of the war in the Gulf.

Diplomatic initiatives to date have had little effect on Assad who has so far correctly calculated the play of forces in the area and concluded that they are only weakly arrayed against him. If the U.S. is to rein in Syria’s spoiling role, it can only do so through the exertion of real muscle which will pose a vital threat to Assad’s position and power.

CIA Document screen shot

With Iraq seeking to enjoin support internationally in the war, the U.S. had to scramble to prevent the shutdown of a pipeline — a dilemma Fuller suggests could be alleviated through a change in narrative to present Syria as a more deviant enemy than even Iran. That, alone, would have changed the face of the war bearing the names of the two principal adversaries — Sunni majority, Iraq, and Syria-allied, Shi’a, Iran.

Fuller asserted,

“The US should consider urging Iraq to take the war to the other key source of its predicament: Syria.”

Further, he continued,

“The US should consider sharply escalating the pressures against Assad [Sr.] through covertly orchestrating simultaneous military threats against Syria from three border states hostile to Syria: Iraq, Israel and Turkey. Iraq, perceived to be increasingly desperate in the Gulf war, would undertake limited military (air) operations against Syria with the sole goal of opening the pipeline. Although opening war on a second front against Syria poses considerable risk to Iraq, Syria would also face a two-front war since it is already heavily engaged in the Bekaa, on the Golan and in maintaining control over a hostile and restive population inside Syria.

“Israel would simultaneously raise tensions along Syria’s Lebanon front without actually going to war. Turkey, angered by Syrian support to Armenian terrorism, to Iraqi Kurds on Turkey’s Kurdish border areas and to Turkish terrorists operating out of northern Syria, has often considered launching unilateral military operations against terrorist camps in northern Syria. Virtually all Arab states would have sympathy for Iraq.

“Faced with three belligerent fronts, Assad would probably be forced to abandon his policy of closure of the pipeline. Such a concession would relieve the economic pressure on Iraq, and perhaps force Iran to reconsider bringing the war to an end. It would be a sharpening blow to Syria’s prestige and could effect the equation of forces in Lebanon.”

In context, then-President Ronald Reagan faced pressure both to insert military power in Lebanon — a theater of stated neutrality for the U.S. — and to prohibit actual military assistance in the fraught regional entanglement.

That is, until a suicide bomber decimated a U.S. Marines barracks encamped at an airport in Beirut, killing hundreds — just one month subsequent to the date on Fuller’s Syria action plan.

Micah Zenko, Senior Fellow at the Council on Foreign Relations — an albeit establishment- and Deep State-connected think tank — in “When America Attacked Syria,” wrote in 2012:

“The October 23, 1983, suicide truck bombing of the Marine barracks at the Beirut International Airport would kill 241 U.S. military personnel; simultaneously, another suicide bomber killed fifty-eight French servicemen of the MNF several kilometers away. (Two weeks later, yet another truck bomb exploded in the Israeli military headquarters in Tyre, killing sixty.) A FBI forensics assessment called the Marine barracks bombing the ‘biggest non-nuclear explosion since World War II.’ According to a Pentagon commission formed to investigate the attack, it was ‘tantamount to an act of war using the medium of terrorism.’ Within weeks, the CIA determined that ‘the bombings…of the United States and French MNF headquarters were carried out by Shia radicals, armed, trained, and directed by Syria and Iran.’”

That the CIA — master meddler in the affairs of sovereign nations — determined fault for the bombings rested with Syria and Iran left both plausibly responsible, with public perception largely following suit.

That a situation eerily similar — in behind-the-scenes string-pulling and long-term U.S. commitment to deposing an Assad from rule in Syria — appears to be playing out nearly three-and-a-half decades later, bellows resoundingly on failures of interventionist foreign policy.

Or, perhaps, its successes.

“Such a threat must be primarily military in nature. At present there are three relatively hostile elements around Syria’s borders: Israel, Iraq and Turkey. Consideration must be given to orchestrating a credible military threat against Syria in order to induce at least some moderate change in its policies,” Fuller explained in the document.

“This paper proposes serious examination of the use of all three states – acting independently – to exert the necessary threat. Use of any one state in isolation cannot create such a credible threat.”

Syria is now a landmine for the Trump administration — as it has been in varying intensity for a lengthy succession of presidents before.

 

 

 
via

The Order Of Skull And Bones

 Political  Comments Off on The Order Of Skull And Bones
Apr 122017
 

Everything You Ever Wanted to Know About The Order Of Skull And Bones, But Were Afraid to Ask

The Order Of Skull And Bones

The story begins at Yale, where three threads of American social history — espionage, drug smuggling and secret societies — intertwine into one. ParaScope is pleased to present this treatise on the Order of Skull and Bones, whose initiates fill the ranks of the global elite. Is Skull and Bones the American branch of the Illuminati? Are national and global events manipulated as part of a grand Hegellian equation, thesis and anti-thesis yielding a New World Order synthesis? The evidence and events surrounding the Order of Skull and Bones will shock you. Read on.

1. The Secret Origins of Skull & Bones

 
The Secret Origins of Skull & BonesThe story begins at Yale, where three threads of American social history — espionage, drug smuggling and secret societies — intertwine into one.

Elihu Yale was born near Boston, educated in London, and served with the British East India Company, eventually becoming governor of Fort Saint George, Madras, in 1687. He amassed a great fortune from trade and returned to England in 1699. Yale became known as quite a philanthropist; upon receiving a request from the Collegiate School in Connecticut, he sent a donation and a gift of books. After subsequent bequests, Cotton Mather suggested the school be named Yale College, in 1718.

A statue of Nathan Hale stands on Old Campus at Yale University. There is a copy of that statue in front of the CIA’s headquarters in Langley, Virginia. Yet another stands in front of Phillips Academy in Andover, Massachusetts (where George H.W. Bush (’48) went to prep school and joined a secret society at age twelve).

Nathan Hale, along with three other Yale graduates, was a member of the “Culper Ring,” one of America’s first intelligence operations. Established by George Washington, it was successful throughout the Revolutionary War. Nathan was the only operative to be ferreted out by the British, and after speaking his famous regrets, he was hanged in 1776. Ever since the founding of the Republic, the relationship between Yale and the “Intelligence Community” has been unique.

In 1823, Samuel Russell established Russell and Company for the purpose of acquiring opium in Turkey and smuggling it to China. Russell and Company merged with the Perkins (Boston) syndicate in 1830 and became the primary American opium smuggler. Many of the great American and European fortunes were built on the “China”(opium) trade.

One of Russell and Company’s Chief of Operations in Canton was Warren Delano, Jr., grandfather of Franklin Roosevelt. Other Russell partners included John Cleve Green (who financed Princeton), Abiel Low (who financed construction of Columbia), Joseph Coolidge and the Perkins, Sturgis and Forbes families. (Coolidge’s son organized the United Fruit company, and his grandson, Archibald C. Coolidge, was a co-founder of the Council on Foreign Relations.)

William Huntington Russell (’33), Samuel’s cousin, studied in Germany from 1831-32. Germany was a hotbed of new ideas. The “scientific method” was being applied to all forms of human endeavor. Prussia, which blamed the defeat of its forces by Napoleon in 1806 on soldiers only thinking about themselves in the stress of battle, took the principles set forth by John Locke and Jean Rosseau and created a new educational system. Johan Fitche, in his “Address to the German People,” declared that the children would be taken over by the State and told what to think and how to think it.

Georg Wilhelm Friedrich Hegel took over Fitche’s chair at the University Of Berlin in 1817, and was a professor there until his death in 1831. Hegel was the culmination of the German idealistic philosophy school of Immanuel Kant.

To Hegel, our world is a world of reason. The state is Absolute Reason and the citizen can only become free by worship and obedience to the state. Hegel called the state the “march of God in the world” and the “final end”. This final end, Hegel said, “has supreme right against the individual, whose supreme duty is to be a member of the state.” Both fascism and communism have their philosophical roots in Hegellianism. Hegellian philosophy was very much in vogue during William Russell’s time in Germany.

When Russell returned to Yale in 1832, he formed a senior society with Alphonso Taft (’33). According to information acquired from a break-in to the “tomb” (the Skull and Bones meeting hall) in 1876, “Bones is a chapter of a corps in a German University…. General Russell, its founder, was in Germany before his Senior Year and formed a warm friendship with a leading member of a German society. He brought back with him to college, authority to found a chapter here.” So class valedictorian William H. Russell, along with fourteen others, became the founding members of “The Order of Scull and Bones,” later changed to “The Order of Skull and Bones”.

The secretive Order of Skull and Bones exists only at Yale. Fifteen juniors are “tapped” each year by the seniors to be initiated into next year’s group. Some say each initiate is given $15,000 and a grandfather clock. Far from being a campus fun-house, the group is geared more toward the success of its members in the post-collegiate world.

The family names on the Skull and Bones roster roll off the tongue like an elite party list — Lord, Whitney, Taft, Jay, Bundy, Harriman, Weyerhaeuser, Pinchot, Rockefeller, Goodyear, Sloane, Stimson, Phelps, Perkins, Pillsbury, Kellogg, Vanderbilt, Bush, Lovett and so on.

William Russell went on to become a general and a state legislator in Connecticut. Alphonso Taft was appointed U.S. Attorney General, Secretary of War (a post many “Bonesmen” have held), Ambassador to Austria, and Ambassador to Russia (another post held by many “Bonesmen”). His son, William Howard Taft (’87), is the only man to be both President of the United States and Chief Justice of the Supreme Court.

2. Secrets of the “Tomb”

 
The Secret Origins of Skull & BonesThe Order flourished from the very beginning in spite of occasional squalls of controversy. There was dissension from some professors, who didn’t like its secrecy and exclusiveness. And there was backlash from students, showing concern about the influence “Bones” was having over Yale finances and the favoritism shown to “Bonesmen.”

In October of 1873, Volume 1, Number 1, of The Iconoclast was published in New Haven. It was only published once and was one of very few openly published articles on the Order of Skull and Bones.

From The Iconoclast:

“We speak through a new publication. because the college press is closed to those who dare to openly mention ‘Bones’….

“Out of every class Skull and Bones takes its men. They have gone out into the world and have become, in many instances, leaders in society. They have obtained control of Yale. Its business is performed by them. Money paid to the college must pass into their hands, and be subject to their will. No doubt they are worthy men in themselves, but the many, whom they looked down upon while in college, cannot so far forget as to give money freely into their hands. Men in Wall Street complain that the college comes straight to them for help, instead of asking each graduate for his share. The reason is found in a remark made by one of Yale’s and America’s first men: ‘Few will give but Bones men and they care far more for their society than they do for the college….’

“Year by year the deadly evil is growing. The society was never as obnoxious to the college as it is today, and it is just this ill-feeling that shuts the pockets of non-members. Never before has it shown such arrogance and self-fancied superiority. It grasps the College Press and endeavors to rule it all. It does not deign to show its credentials, but clutches at power with the silence of conscious guilt.

“To tell the good which Yale College has done would be well nigh impossible. To tell the good she might do would be yet more difficult. The question, then, is reduced to this — on the one hand lies a source of incalculable good — on the other a society guilty of serious and far-reaching crimes. It is Yale College against Skull and Bones!! We ask all men, as a question of right, which should be allowed to live?”

At first, the society held its meetings in hired halls. Then in 1856, the “tomb”, a vine-covered, windowless, brown-stone hall was constructed, where to this day the “Bonesmen” hold their “strange, occultish” initiation rites and meet each Thursday and Sunday.

On September 29, 1876, a group calling itself “The Order of File and Claw” broke into the Skull and Bones’ holy of holies. In the “tomb” they found lodge-room 324 “fitted up in black velvet, even the walls being covered with the material.” Upstairs was lodge-room 322, “the ‘sanctum sanctorium’ of the temple… furnished in red velvet” with a pentagram on the wall. In the hall are “pictures of the founders of Bones at Yale, and of members of the Society in Germany, when the chapter was established here in 1832.” The raiding party found another interesting scene in the parlor next to room 322.

From “The Fall Of Skull And Bones”:

“On the west wall, hung among other pictures, an old engraving representing an open burial vault, in which, on a stone slab, rest four human skulls, grouped about a fools cap and bells, an open book, several mathematical instruments, a beggar’s scrip, and a royal crown. On the arched wall above the vault are the explanatory words, in Roman letters, ‘We War Der Thor, Wer Weiser, Wer Bettler Oder, Kaiser?’ and below the vault is engraved, in German characters, the sentence; ‘Ob Arm, Ob Beich, im Tode gleich.’

The picture is accompanied by a card on which is written, ‘From the German Chapter. Presented by D. C. Gilman of D. 50’.”

Daniel Coit Gilman (’52), along with two other “Bonesmen,” formed a troika which still influences American life today. Soon after their initiation in Skull and Bones, Daniel Gilman, Timothy Dwight (’49) and Andrew Dickinson White (’53) went to study philosophy in Europe at the University of Berlin. Gilman returned from Europe and incorporated Skull and Bones as Russell Trust, in 1856, with himself as Treasurer and William H. Russell as President. He spent the next fourteen years in New Haven consolidating the order’s power.

Gilman was appointed Librarian at Yale in 1858. Through shrewd political maneuvering, he acquired funding for Yale’s science departments (Sheffield Scientific School) and was able to get the Morrill Land Bill introduced in Congress, passed and finally signed by President Lincoln, after being vetoed by President Buchanan.

This bill, “donating public-lands for State College for agriculture and sciences”, is now known as the Land Grant College Act. Yale was the first school in America to get the federal land scrip and quickly grabbed all of Connecticut’s share at the time. Pleased by the acquisitions, Yale made Gilman a Professor of Physical Geography.

Daniel was the first President of the University of California. He also helped found, and was the first president of, John Hopkins.

Gilman was first president of the Carnegie Institution and involved in the founding of the Peabody, Slater and Russell Sage Foundations.

His buddy, Andrew D. White, was the first president of Cornell University (which received all of New York’s share of the Land Grant College Act), U.S. Minister to Russia, U.S. Ambassador to Berlin and first president of the American Historical Association. White was also Chairman of the American delegation to the first Hague Conference in 1899, which established an international judiciary.

Timothy Dwight, a professor at Yale Divinity School, was installed as president of Yale in 1886. All presidents since, have been either “Bonesmen” or directly tied to the Order and its interests.

The Daniel/Gilman/White trio was also responsible for the founding of the American Economic Association, the American Chemical Society and the American Psychological Association. Through their influences on John Dewey and Horace Mann, this trio continues to have an enormous impact on education today.

3. Networks of Power

 
The Secret Origins of Skull & BonesIn his book “America’s Secret Establishment,” Antony Sutton outlined the Order of Skull and Bones’ ability to establish vertical and horizontal “chains of influence” that ensured the continuity of their conspiratorial schemes.

The Whitney-Stimson-Bundy links represent the “vertical chain”.

W. C. Whitney (’63), who married Flora Payne (of the Standard Oil Payne dynasty), was Secretary of the Navy. His attorney was a man named Elihu Root. Root hired Henry Stimson (’88), out of law school. Stimson took over from Root as Secretary of War in 1911, appointed by fellow Bonesman William Howard Taft. Stimson later became Coolidge’s Governor-General of the Philippine Islands, Hoover’s Secretary of State, and Secretary of War during the Roosevelt and Truman administrations.

Hollister Bundy (’09) was Stimson’s special assistant and point man in the Pentagon for the Manhattan Project. His two sons, also members of Skull and Bones, were William Bundy (’39) and McGeorge Bundy (’40) — both very active in governmental and foundation affairs.

The two brothers, from their positions in the CIA, the Department of Defense and the State Department, and as Special Assistants to Presidents Kennedy and Johnson, exercised significant impact on the flow of information and intelligence during the Vietnam “War.”

William Bundy went on to be editor of Foreign Affairs, the influential quarterly of the Council on Foreign Affairs (CFR). McGeorge became president of the Ford Foundation.

Another interesting group of “Bonesmen” is the Harriman/Bush crowd. Averil Harriman (’13), “Elder Statesman” of the Democratic Party, and his brother Roland Harriman (’17) were very active members. In fact, four of Roland’s fellow “Bonesmen” from the class of 1917 were directors of Brown Brothers, Harriman, including Prescott Bush (’17), George Bush’s dad.

Since the turn of the century, two investment bank firms — Guaranty Trust and Brown Brothers, Harriman — were both dominated by members of Skull and Bones. These two firms were heavily involved in the financing of Communism and Hitler’s regime.

Bonesman share an affinity for the Hegellian ideas of the historical dialectic, which dictates the use of controlled conflict — thesis versus anti-thesis — to create a pre-determined synthesis. A synthesis of their making and design, where the state is absolute and individuals are granted their freedoms based on their obedience to the state — a New World Order.

Funding and political maneuvering on the part of “Bonesmen” and their allies helped the Bolsheviks prevail in Russia. In defiance of federal laws, the cabal financed industries, established banks and developed oil and mineral deposits in the fledgling U.S.S.R.

Later, Averil Harriman, as minister to Great Britain in charge of Lend-Lease for Britain and Russia, was responsible for shipping entire factories into Russia. According to some researchers, Harriman also oversaw the transfer of nuclear secrets, plutonium and U. S. dollar printing plates to the U.S.S.R.

In 1932, the Union Banking Corporation of New York City had enlisted four directors from the (’17) cell and two Nazi bankers associated with Fritz Thyssen, who had been financing Hitler since 1924.

From “George Bush; The Unauthorized Biography”:

“President Franklin Roosevelt’s Alien Property Custodian, Leo T. Crowley, signed Vesting Order Number 248 [11/17/42] seizing the property of Prescott Bush under the Trading with Enemy Act. The order, published in obscure government record books and kept out of the news, Note #4 explained nothing about the Nazis involved; only that the Union Banking Corporation was run for the ‘Thyssen family’ of ‘Germany and/or Hungary’ — ‘nationals … of a designated enemy country.’

“By deciding that Prescott Bush and the other directors of the Union Banking Corporation were legally ‘front men for the Nazis’, the government avoided the more important historical issue: In what way ‘were Hitler’s Nazis themselves hired, armed, and instructed by’ the New York and London clique of which Prescott Bush was an executive manager? …

“4. New York Times, December 16, 1944, ran a five-paragraph page 25 article on actions of the New York State Banking Department. Only the last sentence refers to the Nazi bank, as follows: ‘The Union Banking Corporation, 39 Broadway, New York, has received authority to change its principal place of business to 120 Broadway.’

“The Times omitted the fact that the Union Banking Corporation had been seized by the government for trading with the enemy, and the fact that 120 Broadway was the address of the government’s Alien Property Custodian.”

After the war, Prescott went on to become a U. S. Senator from Connecticut and favorite golfing partner of President Eisenhower. Prescott claims responsibility for getting Nixon into politics and takes personal credit for bringing Dick on board as Ike’s running mate in 1952.

4. Name Roster of the Secret Establishment

 
The Secret Origins of Skull & BonesThere were so many “Yalies” in the OSS that Yale’s drinking tune, the “Whiffenpoof Song”, became an “unofficial” song of the OSS. Many in the OSS were “Bonesmen” or belonged to the other Yale senior societies.

Robert Lovett (’18), Harriman’s childhood friend, had been tapped into Skull & Bones by Prescott Bush’s cell of ’17 and was a director at Brown Brothers, Harriman.

Again, from “George Bush: The Unauthorized Biography”:

“On October 22, 1945, Secretary of War Robert Patterson created the Lovett Committee, chaired by Robert A. Lovett, to advise the government on the post-World War II organization of U.S. intelligence activities…. The new agency would ‘consult’ with the armed forces, but it must be the sole collecting agency in the field of foreign espionage and counterespionage. The new agency should have an independent budget, and its appropriations should be granted by Congress without public hearings. Lovett appeared before the Secretaries of State, War, and Navy on November 14, 1945…. Lovett pressed for a virtual resumption of the wartime Office of Strategic Services (OSS)…. The CIA was established in 1947 according to the prescription of Robert Lovett, of Jupiter Island.”

Gaddis Smith, a history professor at Yale, said, “Yale has influenced the Central Intelligence Agency more than any other university, giving the CIA the atmosphere of a class reunion.” And “Bonesman” have been foremost among the “spooks” building the CIA’s “haunted house.”

F. Trubee Davison (’18) was Director of Personnel at the CIA in the early years. Some of the other “Bonesmen” connected with the intelligence community are:

  • Sloane Coffin, Jr. (’49)
  • V. Van Dine (’49)
  • James Buckley (’44)
  • Bill Buckley (’50)
  • Hugh Cunnigham (’34)
  • Hugh Wilson (’09)
  • Reuben Holden (’40)
  • Charles R. Walker (’16)
  • Yale’s ‘unofficial’ Secretary of War, Robert D. French (’10)
  • Archibald MacLiesh (’15)
  • Dino Pionzio (’50), CIA Deputy Chief of Station during Allende overthrow
  • William and McGeorge Bundy
  • Richard A. Moore (‘3?)
  • Senator David Boren (’63)
  • Senator John Kerry (’66)

…and, of course, George Herbert Walker Bush. Bush tapped Coffin, who tapped Buckley.

Some other prominent Bonesmen include:

  • Henry Luce (’20), Time-Life
  • John Thomas Daniels (’14), founder Archer Daniels Midland
  • Gifford Pinchot (’89), President Theodore Roosevelt’s chief forester
  • Frederick E. Weyerhaeuser (’96)
  • Harold Stanley (’08), founder of Morgan Stanley, investment banker
  • Alfred Cowles (’13), Cowles Communication
  • Henry P. Davison (’20), senior partner Morgan Guaranty Trust
  • Thomas Cochran (’04) Morgan partner
  • Senator John Heinz (’31)
  • Pierre Jay (’92), first chairman of the Federal Reserve Bank of New York
  • George Herbert Walker, Jr. (’27), financier and co-founder of the NY Mets
  • Artemus Gates (’18), President of New York Trust Company, Union Pacific, TIME, Boeing Company
  • William Draper III (50), the Defense Department, UN and Import-Export Bank
  • Dean Witter, Jr.(’44), investment banker
  • Senator Jonathan Bingham (’36)
  • Potter Stewart (’36), Supreme Court Justice
  • Senator John Chaffe (’47)
  • Harry Payne Whitney (’94), husband of Gertrude Vanderbilt, investment banker
  • Russell W. Davenport (’23), editor Fortune Magazine, created Fortune 500 list
  • Evan G. Galbraith (’50), Ambassador to France and Managing Director of Morgan Stanley
  • Richard Gow (’55), president Zapata Oil
  • Amory Howe Bradford (’34), husband of Carol Warburg Rothschild and general manager for the New York Times
  • C. E. Lord (’49), Comptroller of the Currency
  • Winston Lord (’59), Chairman of CFR, Ambassador to China and assistant Secretary of State in the Clinton administration

Ever since Nixon re-established America’s political relationship with China, many of our ambassadors to that country have been Bonesmen, including George Bush, the first Chief U. S. Liaison Officer to the Peoples Republic of China.

5. China and the Opium Wars

 
The Secret Origins of Skull & BonesWhy all this interest in China? Well, China, among other things, is one of the largest producers and users of opiates in the world.

For a while, in the 1800s, the Yankee Clippers in Connecticut and Massachusetts were the fastest ships on the ocean. Speed was crucial to the opium trade; whoever made the trip from Turkey/India to Macao/Hong Kong/Shanghai first got the most for their goods.

During the Opium Wars, the U.S. chose to stand on the sidelines and cheer for the English and French, knowing that treaty obligations would bring the U.S. a share in the spoils. Russell and Company was at times the only trading house operating in Canton and used the opportunity to developed strong commercial ties and handsome profits.

Powerful national interests were behind the drug trade, because American traders were badly in need of some article the Chinese would buy, since by this time the seal breeding grounds had been nearly wiped out. If the Chinese had not bought opium from Americans, then United States imports of silk, porcelain and tea would have to paid in precious coin, which was in short supply. In 1843, when the Port of Shanghai was opened, Russell and Co. was one of its earliest traders.

In 1903, Yale Divinity School set up a program of schools and hospitals in China. Mao Zedong was among the staff. During the intrigues of China in the 1930s and ’40s, American intelligence called upon the resources of “Yale in China”, and George Bush’s cousin and fellow “Bonesman” Reuben Holden.

After stints as UN Ambassador and Chairman of the Republican National Committee for the beleaguered Richard Nixon, George Bush was sent to look after the “China trade”. The Bush family is still very much involved in the economic activities of “Red” China.

Many researchers contend that George Bush has been with CIA since the early 1950s, and that one of his jobs was to consolidate and co-ordinate the worldwide narcotics industry, the largest industry on Earth. Some say that one of the reasons behind the Vietnam “Police Action” was a cover for the consolidation of the “Golden Triangle”.

6. The War on Drugs: An “Intellectual Fraud”

 
The Secret Origins of Skull & BonesBefore the Vietnam “War”, the Golden Triangle was run by French Intelligence and Corsican mobsters. After the French bailed out and America moved in, the triangle was run by U.S. intelligence, with aid from Sicilian mobsters. This narcotics network is well documented in “The Politics of Heroin in S. E. Asia” by Alfred McCoy, “The Great Heroin Coup” by Henrik Kruger and “Double-Cross” by Sam and Chuck Giancana.

Vice-President George Bush, as Chairman of President Reagan’s cabinet-level working group and as Director of the National Narcotics Interdiction System, was the highest U. S. governmental official involved in the “war on drugs”.

Frances Mullen, Jr., former head of the Drug Enforcement Agency (DEA), called Bush’s efforts “an intellectual fraud” and “a liability rather than an asset”. Soon after these statements, Mullen resigned and the resultant General Accounting Office (GAO) report was buried.

In July, 1985, the suppressed GAO paper reported that there were “no benefits from the National Narcotics Border Interdiction System, directed by George Bush. In fact, the overall effect was to encourage supply….”

Monika Jensen-Stevenson, a “60 Minutes” producer, quit her job after the CBS news program refused to air the story she had uncovered relating to the covert drug trade. Her book, “Kiss The Boys Goodbye”, details how our intelligence community used the apparatus of the POW/MIA governmental agencies as a cover for the trafficking of opiates from the “Golden Triangle”.

President Reagan appointed Reform Party founder and Texas billionaire Ross Perot to the President’s Advisory Council on Foreign Intelligence. Reagan made Perot a special presidential investigator, looking into America’s POW and MIAs from the Vietnam “War”.

Ross took the job to heart and spent considerable time and money in pursuit of the quest. He was given special clearance and access. He asked questions and interviewed everyone he could find.

From “Kiss The Boys Goodbye”:

“Relations between Bush and Perot had gone downhill ever since the Vice-President had asked Ross Perot how his POW/MIA investigations were going.

‘Well, George, I go in looking for prisoners,’ said Perot, ‘but I spend all my time discovering the government has been moving drugs around the world and is involved in illegal arms deals…. I can’t get at the prisoners because of the corruption among our own people.’

“This ended Perot’s official access to the highly classified files as a one-man presidential investigator. ‘I have been instructed to cease and desist,’ he had informed the families of missing men early in 1987.”

The wholesale importation of cocaine into the U.S. during “Iran/Contra” is also well documented. George Bush, is known “to be in the loop” with many of the players keeping in contact directly with his office.

Also, there has been much speculation as to the use of the off-shore rigs, pipelines and other assets of Zapata Offshore being used for narcotic trans-shipments.

Narcotics such as cocaine and heroin cannot be manufactured without the precursor chemicals. One of the largest makers of these precursor chemicals is the Eli Lilly Company of Indianapolis, Indiana. The Quayle family is a large stockholder, and George Bush has been on the Board of Directors. Eli Lilly is also the company that first synthesized LSD for the CIA.

7. George Bush, Skull & Bones and the JFK Assassination

 
The Secret Origins of Skull & BonesRodney Stich’s book “Defrauding America” tells of a “deep-cover CIA officer” assigned to a counter-intelligence unit, code-named Pegasus. This unit “had tape-recordings of plans to assassinate Kennedy” from a tap on the phone of J. Edgar Hoover. The people on the tapes were “[Nelson] Rockefeller, Allen Dulles, [Lyndon] Johnson of Texas, George Bush and J. Edgar Hoover.”

Could George Bush be involved in the JFK assassination?

In 1963, Bush was living in Houston, busily carrying out his duties as president of the Zapata Offshore oil company. He denied the existence of a note sent by the FBI’s J. Edgar Hoover to “Mr. George Bush of the CIA.” When news of the note surfaced, the CIA first said they never commented on employment questions, but later relented said yes, a “George Bush” was mentioned in the note, but that it was “another” George Bush, not the man who took office in the White House in 1988.

Some intrepid reporters tracked down the “other” George Bush and discovered that he was just a lowly clerk who had shuffled papers for the CIA for about six months. He never received any interagency messages from anybody at the FBI, let alone the Queen Mary.

It is also worth noting that a CIA code word for Bay of Pigs was Operation Zapata, and that two of the support vessels were named Barbara and Houston.

Many say that George Bush was high up on the CIA ladder at the time, running proprietorial vehicles and placed in a position of command, responsible for many of the Cubans recruited into “service” at the time. All through the Iran-Contra affair, Felix Rodriguez, the man who captured and had Che Guevara killed for the CIA, always seemed to call Bush’s office first.

From The Realist (Summer, 1991):

“Bush was working with the now-famous CIA agent, Felix Rodriguez, recruiting right-wing Cuban exiles for the invasion of Cuba. It was Bush’s CIA job to organize the Cuban community in Miami for the invasion…. A newly discovered FBI document reveals that George Bush was directly involved in the 1963 murder of President John Kennedy. The document places marksmen by the CIA. Bush at that time lived in Texas. Hopping from Houston to Miami weekly, Bush spent 1960 and ’61 recruiting Cubans in Miami for the invasion….

“George Bush claims he never worked for the CIA until he was appointed Director by former Warren Commission director and then president Jerry Ford in 1976. Logic suggests that is highly unlikely. Of course, Bush has a company duty to deny being in the CIA. The CIA is a secret organization. No one ever admits to being a member. The truth is that Bush has been a top CIA official since before the 1961 invasion of Cuba, working with Felix Rodriguez. Bush may deny his actual role in the CIA in 1959, but there are records in the Bay of Pigs invasion of Cuba that expose Bush’s role…”

On the Watergate tapes, June 23, 1972, referred to in the media as the ‘smoking gun’ conversation, Nixon and his Chief of Staff, H.R. Haldeman, were discussing how to stop the FBI investigation into the CIA Watergate burglary. They were worried that the investigation would expose their connection to ‘the Bay of Pigs thing.’ Haldeman, in his book “The Ends of Power”, reveals that Nixon always used code words when talking about the 1963 murder of JFK. Haldeman said Nixon would always refer to the assassination as ‘the Bay of Pigs’.

On that transcript we find Nixon discussing the role of George Bush’s partner, Robert Mosbacher, as one of the Texas fundraisers for Nixon. On the tapes Nixon keeps referring to the ‘Cubans’ and the ‘Texans.’ The ‘Texans’ were Bush, Mosbacher and Baker. This is another direct link between Bush and evidence linking Nixon and Bush to the Kennedy assassination.”

8. Motives for the Conspiracy

 
The Secret Origins of Skull & BonesSo, why would an intelligence agency/secret society want to smuggle drugs and assassinate JFK?

Well, they make a lot of money, and they garner intelligence assets through their participation. There’s also the rationale that the world is a seamy and unseemly place, and if you’re going to be the ‘big boy’ on the block, you better know what’s going on. And what better way of knowing than by running it yourself? There are also some who theorize that the covert drug trade fits with plans to destabilize American families and society. Through demoralizing and fracturing the body politic, they can impose their will using psychological warfare and the political alchemy of the Hegellian dialectic.

James Shelby Downard’s article, “Sorcery, Sex, Assassination and the Science of Symbolism ,” an underground classic, links American historical events with a wild, numerological, grand occult plan “to turn us into cybernetic mystery zombies”. The assassination of JFK, this article contends, was the performance of a public occult ritual called The Killing of the King, designed as a mass-trauma, mind-control assault against our U.S. national body-politic.

During Operation Sunrise, Operation Blowback, Operation Paperclip and others, thousands of Nazi scientists, researchers and administrators were brought to the United States after World War II. Many were “smuggled” into the country against direct, written, orders from President Harry S. Truman.

Project Monarch was the resumption of a mind-control project called Marionette Programming, which started in Nazi Germany. The basic component of the Monarch Program is the sophisticated manipulation of the mind, using extreme trauma to induce Multiple Personality Disorder.

Mr. Downward feels that the perpetrators purposefully murdered JFK in such a way as to affect our National identity and cohesiveness — to fracture America’s soul. Even the blatancy of their conspiracy was designed to show “their superiority” and “our futility”.

There have been studies that show a correlation between the JFK assassination and the rise in violence in society, distrust of government and other extensions of social ills.

9. The Illuminati: Subverting the Body Politic

 
The Secret Origins of Skull & BonesWhy this attack against our body politic?

In 1785, a bolt of lightning struck a courier en route to Paris from Frankfort-on-the-Main. A tract written by Adam Weishaupt, founder of the Illuminati, “Original Shift in Days of Illuminations,” was recovered from the dead messenger, containing the secret society’s long-range plan for “The New World Order through world revolution”.

The Bavarian Government outlawed the society and in 1787 published the details of The Illuminati conspiracy in “The Original Writings of the Order and Sect of the Illuminati.”

In Adam Weishaupt’s own words:

“By this plan, we shall direct all mankind in this manner. And, by the simplest means, we shall set all in motion and in flames. The occupations must be so allotted and contrived that we may, in secret, influence all political transactions.”

There is disagreement among scholars as to whether or not the Illuminati survived its banishment. Nevertheless, the group had been quite successful in attracting members and had allied itself with the extensive Masonic networks.

The Illuminati was publicly founded May 1, 1776 at the University of Ingolstadt by Weishaupt, Professor of Canon Law. It was a very “learned” society; Weishaupt drew the earliest members of his new order from among his students.

On December 5, 1776, students at William and Mary College founded a secret society, Phi Beta Kappa. A second chapter was formed, at Yale, in 1780. The anti-Masonic movement in the United States during the 1820s held groups such as Phi Beta Kappa in a bad light. Because of pressure, the society went public. This is noted by some researchers as the direct cause of the appearance of Yale’s Order of Skull and Bones.

In “The Cyclopedia Of Fraternities”, a genealogical chart of general Greek-Letter college fraternities in the United States, shows Phi Beta Kappa as “the parent of all the fraternal systems in [American] higher education.” There is only one “side” lineal descendant: the Yale chapter of 1780. The line then continues to Skull and Bones in 1832, and on through the other “only at Yale” senior societies, Scroll & Key and Wolf’s Head.

Phi Beta Kappa is the “first three Greek letters, for ‘Philosophia Biou Kubernetes’ or ‘Love of wisdom, the helmsman of life’.” A skull homophone is scull, a quick, gliding boat and part of Skull & Bones first nomenclature.

John Robison, a professor of natural philosophy at Edinburgh University in Scotland and a member of a Freemason Lodge, said that he was asked to join the Illuminati. After study, he concluded the purposes of the Illuminati were not for him.

In 1798, he published a book called “Proofs Of A Conspiracy”:

“An association has been formed for the express purpose of rooting out all the religious establishments and overturning all the existing governments…. the leaders would rule the World with uncontrollable power, while all the rest would be employed as tools of the ambition of their unknown superiors.”

“Proofs of A Conspiracy” was sent to George Washington. Responding to the sender of the book with a letter, the president said he was aware the Illuminati were in America. He felt that the Illuminati had “diabolical tenets” and that their object was “a separation of the People from their government.”

In “Proofs Of A Conspiracy”, Robison printed the ceremony of initiation of the “Regent degree” in Illuminism. In it “a skeleton is pointed out to him [the initiate], at the feet of which are laid a crown and a sword. He is asked ‘whether that is the skeleton of a king, nobleman or a beggar.’ As he cannot decide, the president of the meeting says to him, ‘The character of being a man is the only one that is importance'”.

This is, essentially, the same as the writing in the Skull & Bones “tomb”:

“Wer war der Thor, wer Weiser, Bettler oder Kaiser? Ob Arm, ob Reich, im Tode gleich.”

Which reads:

“Who was the fool, who the wise man, beggar or king? Whether poor or rich, all’s the same in death.”

10. Skull & Bones = Illuminati?

 
The Secret Origins of Skull & BonesIs the Order of the Skull & Bones part of the Illuminati?

When a person is initiated into Skull & Bones, they are given a new name, similar to the practice of the Illuminati. And many recorded Illuminati members can be shown to have contact and/or strong influences with many of the professors that taught “Bonesmen” in Berlin.

When a secret society conspires against the sovereignty of a king, they need to organize, raise funds, make their plans operational, and hopefully bring them to fruition.

Could we have in the United States a secret society that has used the “National Security State” as a cover for their nefarious plans?

From “George Bush: The Unauthorized Biography”:

“That September [1951], Robert Lovett replaced Marshall as secretary of defense. Meanwhile, Harriman was named director of the Mutual Security Agency, making him the U.S. chief of the Anglo-American military alliance. By now, Brown Brothers, Harriman was everything but commander-in-chief.

“A central focus of the Harriman security regime in Washington (1950-53) was the organization of covert operations and ‘psychological warfare.’ Harriman, together with his lawyers and business partners, Allen and John Foster Dulles, wanted the government’s secret services to conduct extensive propaganda campaigns and mass-psychology experiments within the U.S.A., and paramilitary campaigns abroad….

“The Harriman security regime created the Psychological Strategy Board (PSB) in 1951. The man appointed director of the PSB [was] Gordon Gray…. Gordon’s brother, R.J. Reynolds chairman Bowman Gray Jr., was also a naval intelligence officer, known around Washington as the ‘founder of operational intelligence.’ Gordon Gray became a close friend and political ally of Prescott Bush; and Gray’s son became for Prescott’s son, George, his lawyer and the shield of his covert policy.”

So you have the Whitney/Stimson/Bundy clan and the Harriman/Bush boys wielding a tremendous amount of influence on the political, economic and social affairs of America and the world. Then you have Prescott Bush’s buddy Richard Nixon as an activist vice-president. Then, a nation-chilling assassination, some time under LBJ with the Bundy boys keeping things in line, then Nixon as President with “Bonesmen” aides Ray Price (’51) and Richard A. Moore. Some time out for a Trilateralist-Democrat-patsy president, followed by Prescott’s son as an activist vice-president under Reagan. Next, we get a Skull and Bones president who declares a “New World Order” while beating up on his business partner, Saddam Hussein.

After twelve years of Republican administrations, Bush passes the reins to his drug smuggling buddy from Arkansas, Bill Clinton, who studied at Yale Law School. According to some researchers, Clinton was recruited as a CIA operative while a Rhodes Scholar at Oxford. Could this be the “old Hegallian historical dialectic process”?

11. World History: Plan or Accident?

 
The Secret Origins of Skull & BonesWill we get another failed Democratic administration? A scandal as disgraceful as Nixon’s fall? When Robert P. Johnson (William Barr) told Clinton in a bunker in Arkansas that “you are our fair-haired boy, but you do have competition for the job you seek. We would never put all our eggs in one basket. You and your state have been our greatest asset…. Mr. Casey wanted me to pass on to you, that unless you fuck up and do something stupid, you are number one on our short list for shot at the job you always wanted.”

So, you have William Casey — CIA Director, George Bush’s campaign manager and Sovereign Knight of Malta — speaking through the proxy of George Bush’s last Attorney General to George’s rival in the 1992 federal elections. Is it all just a show and sham for U.S. hoi polloi?

Perhaps so, if there exists the type of control over the electoral process as told by Mae Brussell and the suppressed book “VoteScam,” written by Jim and Ken Collier:

“…Your vote and mine may now be a meaningless bit of energy directed by preprogrammed computers-which can be fixed to select certain pre-ordained candidates and leave no footprints or paper trail.

“In short, computers are covertly stealing your vote.

“–For almost three decades the American vote has been subject to government-sponsored electronic theft.

“–The vote has been stolen from you by a cartel of federal “national security” bureaucrats, who include higher-ups in the Central Intelligence Agency, political party leaders, Congressmen, co-opted journalists — and the owners and managers — of the major Establishment news media, who have decided in concert that how America’s votes are counted, by whom they are counted and how the results are verified and delivered to the public is, as one of them put it, ‘Not a proper area of inquiry.’

“–By means of an unofficial private corporation named News Election Service (NES), the Establishment press has actual physical control of the counting and dissemination of the vote, and it refuses to let the public know how it is done.”

Is the American electorate subjected to cyclic propaganda, pre-selected candidates and winners, and psychological warfare to alienate Americans from the institutions established to serve them by the Constitution? Are the Democratic and Republican National Parties used for a Hegellian experiment in controlled conflict?

Pamela Churchill Harriman, Averil’s wife, is one of the Democratic Party’s biggest fund-raisers. She once gave Bill a job as director of her “PAM PAC” when he was defeated for governor in 1980. Bill paid her back by appointing her as Ambassador to France.

Another Harriman/Bush friend, Eugene Stetson (’34), was an assistant manager for Prescott Bush at Brown Brothers, Harriman’s New York office. He organized the H. Smith Richardson Foundation. The foundation, in the late 1950s, participated in the MKULTRA, the CIA’s domestic covert psychological warfare operation. The Richardson Foundation helped to finance the testing of psychotropic drugs, including LSD, at Bridgewater Hospital in Massachusetts, the center of some of the most brutal MK-ULTRA experiments.

During the Iran-Contra operations, the H. Smith Richardson Foundation was a “private donors steering committee,” working with the National Security Council to co-ordinate the Office of Public Diplomacy. This was an effort to propagandize in favor of and run cover for the Iran-Contra operations, and to coordinate published attacks on opponents of the program.

The H. Smith Richardson Foundation also runs the Center for Creative Leadership at Langley to “train leaders of the CIA,” as well as another center near Greensboro, North Carolina, that trains CIA and Secret Service Agents. Almost everyone who achieves the military rank of general also gets this training.

This is just the tip of an iceberg. You also have eugenics and population control, suppressed history and technology, yearly retreats, profitable partnerships with brutal dictators, deals with “terrorists”, the involvement of the Knights of Malta, war-mongering and profiteering, mind-control, secret societies for teens, ritual magic and more — all spinning the dark threads in the web of conspiracy that our spinning blue ball has gotten caught in.

We’ve got a whole new crop of “Bonesmen” coming up, including George H.W. Bush’s son George W. Bush (’68), Governor of Texas.

When Don Schollander (’68), the Olympic gold-medalist and only known Skull and Bones member living in Portland, was contacted by Willamette Week reporter John Schrang regarding his involvement in the Order, he said, “It’s really something I can’t talk about.”

Not wouldn’t, but “couldn’t”.

In wake of Antony Sutton’s first ground-breaking exposes of the Order, the Sterling Library at Yale has refused to allow any other researchers access to the Russell Trust papers.

Daniel Gilman, like most Bonesmen, makes no mention of Skull & Bones or the Russell Trust in his memoirs or biographies.

So, are we all just ‘fodder” for a secret society with satanic overtones that is attempting to form a one world government with themselves at the helm? Or is the Order of Skull and Bones just a bunch of frat boys from Yale? Wanna bet your future on it?

The Order Of Skull And Bones

 
via

Apr 102017
 
Superhuman abilities have been studied for thousands of years in all walks of life. Religious ‘miracles’ often with hundreds of witnesses have been said to be due to psychic abilities, but studies in China have overwhelming proof that these stories are more than just speculation.

CIA Document Confirms Reality Of Humans With ‘Superhuman Powers’

For the past 20 years scientists have been studying subjects in China who appear to have superhuman powers, and the results have been published in many journals and books.

It is thought that these gifted people have been able to tap into a quantum level, unobservable by the human eye..

To understand properly, you need to be aware of the relationship between our consciousness and our physical reality. Both things are very real, and they have a very complicated relationship. Inventor of quantum theory Max Planck said we should regard consciousness as “fundamental” and matter as “derivative from consciousness.”

Another physicist Eugene Wigner has said on the matter “it was not possible to formulate the laws of quantum mechanics in a fully consistent way without reference to consciousness.”

The document containing the information about the events in China is called “Chronology of Recent Interest in Exceptional Functions of The Human Body in the People’s Republic of China.” The document talks about the Chinese government and it’s work with parapsychology, that is remote viewing, telepathy, psychokinesis.

The document has only recently become available due to a Freedom of Information Act request (FOIA), and it includes interesting details of individuals who have purported superhuman abilities, and that they have been studies countless times by scientists all over the world. The document is on the CIA website, but can only be accessed by the ‘Internet Archives’.

A brief outline of the important items in it the CIA document include:

  • In 1979, a major Chinese science journal, Ziran Zachi, printed a report on “non-visual pattern recognition” where several accounts of exceptional human body function were confirmed.
  • In 1980, the Journal and the Chinese Human Body Science Association held a parapsychology conference in Shanghai with participants from over 20 research institutes and universities from around the world.
  • In 1981, there was a formation of over 100 special places to study children with exceptional abilities with over 100 formally trained scholars.
  • In 1982, the Chinese Academy of Sciences sponsored a public hearing in Beijing and the sole purpose was to discuss humans with parasychological abilities, there were over 400 scholars in attendance.
CHRONOLOGY OF RECENT INTEREST IN EXCEPTIONAL FUNCTIONS OF THE HUMAN BODY IN THE PEOPLE’S REPUBLIC OF CHINA

CIA-RDP96-00792R000400300011-9

Zhang Baosheng

In April of 1982, the Party’s National Committee of Science at Beijing Teacher’s College held a trial to test the abilities of certain students. Most of the results came back negative, apart from Zhang Baosheng. The next year, Zhang was studied again, this time by 19 researchers led by Prof. Lin Shuhang of the physics department of Beijing Teachers college, positive results were recorded for his superhuman powers.

Zhang was able to move objects in and out of sealed containers using only the power of his mind. Prof. Shuhang studied Zhang for six months and he was repeatedly able to place small pieces of paper into sealed test tubes, and then take them out again, without touching them. He repeated the tests with other small items like paperclips and insects, and Zhang could move these, too.

A film was made by the Institute of Space-Medico Engineering in 1987 showcasing the results, which showed a medicine pill moving through an irreversibly sealed glass vial, which occurred in three frames of a 400 frame per second film.

Another release from the CIA (Research Into Paranormal Ability To Break Through Spatial Barriers) contains this description of Zhang’s abilities:

A wooden cabinet 120 by 180 by 60 centimeters was used as a sealed container. Sheets of papers and boards with one of a kind markings were used as the target objects and placed inside the cabinet on the upper shelf. Without damaging the cabinet or opening the door, the person with ESP was able to remove the target objects and also was able to put them back inside. This demonstrates that even when using especially large container it is possible to completely break through spacial barriers, however, the success rate was much lower and was exceptionally difficult. (source)

According to Eric Davis, Ph.D, FBIS, there were other children like Zhang. A declassified US Air Force document obtained via the Federation of American Scientists, contained a report from Shuhuang that ‘gifted children’ could teleport small, physical objects from one place to another. Objects like watches, horseflies, other insects, radio micro-transmitters, photosensitive paper , without ever touching the objects beforehand. The research was carried out by the prestigious Department of Defense, and is a noteworthy case because it was deemed necessary that an unclassified Intelligence Information Report be prepared for public viewing.

In a similar study, Dr. Dean Radin, Chief Scientists at the Institute of Noetic Sciences they were able to record pieces of paper being teleported into sealed plastic containers, the report was published in 2010 by retired research chemist Dong Shen. The most fascinating part of this study, is that the teleportation techniques were taught to other students with a success rate of 40%. This information is published in his book, Supernormal.

Dr. Dean Radin, states:

“Evaluating the details and credibility of these studies have been difficult because many of the papers appear only in Chinese. The techniques have not yet been reported outside of China, and the experimental methods employed in conducting such tests do not appear to be as rigorously controlled as compared to typical Western methods…”

Although, Eric Davis has said,

“The results of the Chinese Teleportation experiments can simply be explained as a human consciousness phenomenon that somehow acts to move or rotate test specimens through a 4th spacial dimension, so that specimens are able to penetrate the solid walls/barriers of their containers without physically breaching them.”

The American Journal of Chinese Medicine has evidence of a similar, amazing story of a woman named Chulin Sun. The study in the US National Library of Medicine documents this lady’s ability to speed up the growth of seeds to an amazing rate.

The study states:
Chulin Sun is a woman with exceptional powers (Shen and Sun, 1996, 1998; Sun, 1998). A member of the Chinese Somatic Science Research Institute, she is a practitioner of Waiqi. Waiqi is a type of qigong that teaches the practitioner to bring the qi energy of traditional Chinese medicine under the control of the mind. Chulin Sun can induce plant seeds to grow shoots and roots several cm long within 20 min using mentally projected qi energy.

This has been demonstrated on more than 180 different occasions at universities as well as science and research institutions in China (including Taiwan and Hong Kong) as well as other countries (e.g., Japan, Thailand, Malaysia, etc.) (Ge et al., 1998; Qin et al., 1998; Lee et al., 1999). We took part in and repeated the qi germination experiments seven times, and five of them succeeded (Ge et al., 1998). This remarkable effect on seed development has drawn widespread attention (Tompkins and Bird, 1973; Lee, 1998), but the biological mechanisms that underlie this phenomenon are unknown.

Sun is thought to have been able to do this by tapping into a level of Qi.

Qi is described as the ‘oneness’ that is flowing through everything all of the time. It is responsible for every good and bad thing that happens to you, and to harness it and use it for good, you must be free of the constraints of the physical world.

These studies prove that ‘super-humans’ may exist and that they may not fully understood by mainstream science, The unwillingness by the government to allow them to be studied in the public eye means only the secret intelligence services are the ones who really understand the extent of these extraordinary human beings.

 

Wikileaks: CIA Malware For Windows “Grasshopper”

 Political  Comments Off on Wikileaks: CIA Malware For Windows “Grasshopper”
Apr 072017
 

RELEASE: CIA malware for Windows “Grasshopper” — which includes its own language

Wikileaks: CIA Malware For Windows "Grasshopper"

Grasshopper basically allows the Deep State to do anything it wants remotely to a Windows machine. It doesn’t seem to matter if it is Windows XP, Windows 7, Windows 8, or Windows Server versions 2003 or 2008. Almost all the attacks and hijacks bypassed the major intrusion detection systems (MS Security, Symantec, Kapersky, and Rising). No matter how locked down or safe you thought your Windows install was, you were wrong.

Oh even better. It looks like these were designed specifically to avoid the major security programs.

From Wikileaks:

Grasshopper

7 April, 2017

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration”. Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.

Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’ – whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit.” confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.”. While the CIA claims that “[most] of Carberp was not used in Stolen Goods” they do acknowledge that “[the] persistence method, and parts of the installer, were taken and modified to fit our needs”, providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company “HackingTeam”.

The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise.

Leaked Documents

Grasshopper-v2_0_2-UserGuide
Grasshopper-v1_1-AdminGuide
StolenGoods-2_1-UserGuide
GH-Run-v1_1-UserGuide
GH-ServiceProxy-v1_1-UserGuide

 

“Grasshopper” re-installs itself every 22 hours by corrupting Windows Update… even if is disabled.


 

 

CIA Vault 7 Part 3 “Marble” Allows CIA To Cover Their Tracks!

 Political  Comments Off on CIA Vault 7 Part 3 “Marble” Allows CIA To Cover Their Tracks!
Mar 312017
 

Vault 7 Part 3: WikiLeaks releases the CIA ‘Marble’ dump

CIA Vault 7 Part 3 "Marble" Allows CIA To Cover Their Tracks
WikiLeaks has released the latest batch of documents detailing CIA hacking tactics. The third release, named ‘Marble’, contains 676 source code files for the agency’s secret anti-forensics framework.Marble Framework, which WikiLeaks explains is part of the CIA’s Core Library of malware, is used to hamper forensic investigators from attributing viruses, trojans and hacking attacks to the CIA. WikiLeaks said Marble was in use at the agency as recently as 2016.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

From Wikileaks:

Marble Framework

31 March, 2017

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

 
via

Mar 272017
 

Over the last two decades, the Pentagon has lost an astonishing $10 trillion dollars… and the Defense Department has no idea where it went!

$10 Trillion Missing From Pentagon And No One Knows Where It Is

Over a mere two decades, the Pentagon lost track of a mind-numbing $10 trillion — that’s trillion, with a fat, taxpayer-funded “T” — and no one, not even the Department of Defense, really knows where it went or on what it was spent.

Even though audits of all federal agencies became mandatory in 1996, the Pentagon has apparently made itself an exception, and a full 20 years later stands firmly resolute in never having complied.

Defense officials insist an audit would take too long and ironically cost too much.

“Over the last 20 years, the Pentagon has broken every promise to Congress about when an audit would be completed,” Rafael DeGennaro, director of Audit the Pentagon, told the Guardian recently. “Meanwhile, Congress has more than doubled the Pentagon’s budget.”

President Trump’s newly-proposed budget seeks to toss an additional $54 billion into the evidently bottomless pit.

Without the mandated audit, the Department Of Defense could be purchasing damned near anything, at any cost, and use, or give, it — to anyone, for any reason.

Officials with the Government Accountability Office and Office of the Inspector General have catalogued egregious financial disparities at the Pentagon for years — yet the Defense Department grouses the cost and energy necessary to perform an audit in compliance with the law makes it untenable.

Astonishingly, the Pentagon’s own watchdog tacitly approves this technically illegal workaround — and the legally gray and, yes, literally, on-the-books-corrupt practices in tandem — to what would incontrovertibly be a most unpleasant audit, indeed.

Take the following of myriad examples, called “Plugging,” for which Pentagon bookkeepers are not only encouraged to conjure figures from thin air, but, in many cases, they would be physically and administratively incapable of performing the job without doing so — without ever having faced consequences for this brazen cooking of books.

Reuters reported the results of an investigation into Defense’s magical number-crunching well over three years ago, on November 18, 2013 — detailing the illicit tasks of 15-year employee, Linda Woodford [who] spent the last 15 years of her career inserting phony numbers in the U.S. Department of Defense’s accounts.”

Woodford, who has since retired, and others like her, act as individual pieces in the amassing chewed gum only appearing to plug a damning mishandling of funds pilfered from the American people to fund wars overseas for resources in the name of U.S. defense.

“Every month until she retired in 2011,” Scot J. Paltrow wrote for Reuters, “she says, the day came when the Navy would start dumping numbers on the Cleveland, Ohio, office of the Defense Finance and Accounting Service, the Pentagon’s main accounting agency. Using the data they received, Woodford and her fellow DFAS accountants there set about preparing monthly reports to square the Navy’s books with the U.S. Treasury’s – a balancing-the-checkbook maneuver required of all the military services and other Pentagon agencies.

“And every month, they encountered the same problem. Numbers were missing. Numbers were clearly wrong. Numbers came with no explanation of how the money had been spent or which congressional appropriation it came from. ‘A lot of times there were issues of numbers being inaccurate,’ Woodford says. ‘We didn’t have the detail … for a lot of it.’”

Where a number of disparities could be corrected through hurried communications, a great deal — thousands each month, for each person on the task — required fictitious figures. Murkily deemed, “unsubstantiated change actions” — tersely termed, “plugs” — this artificial fix forcing records into an unnatural alignment is common practice at the Pentagon.

Beyond bogus books, the Pentagon likely flushed that $10 trillion in taxes down the toilet of inanity that is unchecked purchasing by inept staff who must be devoid of prior experience in the field of defense.

This tax robbery would eclipse the palatability of blood money — if it weren’t also being wasted on items such as the 7,437 extraneous Humvee front suspensions — purchased in surplus over the inexplicable 14-year supply of 15,000 unnecessary Humvee front suspensions already gathering warehouse-shelf dust.

And there are three items of note on this particular example, of many:

One, the U.S. Department of Defense considers inventory surpassing a three-year supply, “excessive.”

Two, the stupefying additional seven-thousand-something front suspensions arrived, as ordered, during a period of demand reduced by half.

Three, scores of additional items — mostly unaccounted for in inventory — sit untouched and aging in storage, growing not only incapable of being used, but too dangerous to be properly disposed of safely.

Worse, contractors greedily sink hands into lucrative contracts — with all the same supply-based waste at every level, from the abject disaster that is the $1 trillion F-35 fighter program, to the $8,123.50 shelled out for Bell Helicopter Textron helicopter gears with a price tag of $445.06, to the DoD settlement with Boeing for overcharges of a whopping $13.7 million.

The latter included a charge to the Pentagon of $2,286 — spent for an aluminum pin ordinarily costing just $10 — the irony of whose 228.6 percent markup cannot be overstated.

Considering all the cooking of numbers apparently fueled with burning money stateside, you would think Defense channeled its efforts into becoming a paragon of economic efficiency when the military defends the United States. Overseas. From terrorism. And from terrorists. And terrorist-supporting nations.

But this is the Pentagon — and a trickle of telling headlines regularly grace the news, each evincing yet another missing shipment of weapons, unknown allocation of funds, or retrieval of various U.S.-made arms and munitions by some terrorist group deemed politically less acceptable than others by officials naming pawns.

In fact, so many American weapons and supplies lost by the DoD and CIA become the property of actual terrorists — who then use them sadistically against civilians and strategically against our proxies and theirs — it would be negligent not to describe the phenomenon as pattern, whether or not intent exists behind it.

For now the painstaking audit imperative to Department Of Defense accountability remains only a theory… while the Pentagon’s $10 trillion sits as the world’s largest elephant in apathetic America’s living room.

 

 
via

Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected

 Political  Comments Off on Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected
Mar 242017
 
WikiLeaks Vault 7 shows that the CIA has developed a huge range of attacks against iPhones since at least 2008.

Wikileaks: CIA Hacks Dubbed Dark Matter Reveal How Apple Products Are Infected

Yesterday, Wikileaks released another series from their ‘Vault 7’ CIA hacks called ‘Dark Matter’ where they reveal how Apple products are infected.

According to Wikileaks, ‘Dark Matter’ contains documentation for several CIA projects that infect Apple MAC computer firmware developed by the CIA’s Embedded Development Branch (EDB). Interestingly… the infection persists even if the operating system is re-installed.

From Wikileaks:

Dark Matter

23 March, 2017

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Leaked Documents

Sonic Screwdriver
DerStarke v1.4
DerStarke v1.4 RC1 – IVVRR Checklist
Triton v1.3
DarkSeaSkies v1.0 – URD

Dark Matter Dog

 
via

While The Mainstream Media Focuses On Russia, The Government’s Own Data Shows U.S. Interfered In 81 Elections

 Political  Comments Off on While The Mainstream Media Focuses On Russia, The Government’s Own Data Shows U.S. Interfered In 81 Elections
Mar 232017
 
While the US spin machine hurls accusations about Russian election meddling, it’s worth nothing the US is a seasoned pro at interfering in elections.

While The Mainstream Media Focuses On Russia, The Government's Own Data Shows U.S. Interfered In 81 Elections

Ask an average American who makes a habit of following government-mouthpiece corporate media about interference in national elections and you’ll likely elicit a nebulous response concerning Russian hackers and a plan to install Donald Trump in the White House — but you probably won’t hear a single syllable pertaining to United States government’s actual attempts to do the same.

On Monday, FBI Director James Comey confirmed for the first time publicly the bureau is officially investigating hotly contentious allegations of Russian meddling in the U.S. election — but, even if proven true, such geopolitical escapades better characterize the routine behavior of accuser than of accused.

“The F.B.I., as part of our counterintelligence effort, is investigating the Russian government’s efforts to interfere in the 2016 president election,” the director announced, adding the bureau would conduct a probe to discern whether Trump’s associates had contact with Russian officials.

Despite that the U.S. has hypocritically exerted influence over foreign elections in all corners of the globe — in fact, it has arrogantly done so a whopping 81 times between 1946 and 2000, alone — with just one-third of those operations undertaken overtly.


For months, mainstream media parroted murky accusations hurled by politicians — keen to point a finger of blame for the apparently stultifying victory of a former reality television host on someone — that The Russians had somehow surreptitiously undermined the election-centric foundation of American Democracy.

While that has yet to prove true, this new Red Scare constitutes a duplicitous attempt by the pot to call the kettle … an election meddler.

Researcher Dov Levin of Carnegie Mellon University’s Institute for Politics and Strategy — an expert on the topic at hand — discussed the lengthy but incomplete list of times the U.S. government has interfered in other nations’ elections with NPR’s Ari Shapiro.

Asked for examples where this tampering tangibly altered results, Levin stated,

“One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn’t want him to stay in power there due to his tendency, you know, to disrupts the Balkans and his human rights violations.

“So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. And according to my estimate, that assistance was crucial in enabling the opposition to win.”

Levin reiterated the more blatant methods with which the U.S. asserts dominance — through the overt coups or all-out regime changes branding the nation a notorious interventionist — are not among the list of the 80-plus attempts to manipulate the electoral outcome.

As for the issue of pot versus kettle, Levin explained that — although Russia and other powerful nations indisputably employ similar tactics — the United States has been quite prodigious in its effort.

“Well, for my dataset, the United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.”

As sanctimonious U.S. politicians cry foul about The Russians, it would behoove the new McCarthyites to reflect on the nation’s sticky imperialist fingerprints around the globe — like that time in 1996, when the United States undertook an extensive, secret operation to ensure the presidency of Boris Yeltsin.

That is, of course, former President Boris Yeltsin — of the Russian Federation.

 
By Claire Bernish

Mar 222017
 
Declassified CIA secret weapon of assassination – The Heart Attack Gun

CIA's Heart Attack Gun

A CIA secret weapon used for assassination shoots a small poison dart to cause a heart attack, as explained in Congressional testimony in the short video below. The dart from this secret CIA weapon can penetrate clothing and leave nothing but a tiny red dot on the skin. On penetration of the deadly dart, the individual targeted for assassination may feel as if bitten by a mosquito, or they may not feel anything at all. The poisonous dart completely disintegrates upon entering the target.

The lethal poison then rapidly enters the bloodstream causing a heart attack. Once the damage is done, the poison denatures quickly, so that an autopsy is very unlikely to detect that the heart attack resulted from anything other than natural causes. Sounds like the perfect James Bond weapon, doesn’t it? Yet this is all verifiable in Congressional testimony.

The astonishing information about this secret weapon of the CIA comes from U.S. Senate testimony in 1975 on rogue activities of the CIA. This weapon is only one of many James Bond-like discoveries of the Church Committee hearings, officially known as the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities.

The suspicious death of Justice Scalia

Could this or a similar secret weapon have been used, for instance, in the probable murder of Justice Scalia? This report from the highly respected Liberal newspaper The Washington Post may confirm that conspiracy theorists are onto something in questioning the suspicious death of Justice Scalia.

Yet as details of his sudden death trickled in Sunday, it appeared that the hours afterward were anything but orderly. The man known for his elegant legal opinions and profound intellect was found dead in his room at a hunting resort by a ranch owner.

It then took hours for authorities in remote West Texas to find a justice of the peace, officials said Sunday. When they did, she pronounced Scalia dead of natural causes without seeing the body and decided not to order an autopsy. A second justice of the peace, who was called but couldn’t get to Scalia’s body in time, said she would have ordered an autopsy.

 

Secrets of the CIA

To watch the revealing 45-minute documentary from which the clip below was taken, click here. In this riveting exposé, five former CIA agents describe how their initial pride and enthusiasm at serving their nation turned to anguish and remorse, as they realized that they were actually subverting democracy and killing innocent civilians all in the name “national security” and promoting foreign policy agendas.

Watch the video below for the description of a former CIA secretary and Congressional testimony on this secret assassination weapon which caused heart attacks.

The testimony in the video is from 1975, well over 40 years ago. With the ensuing leaps in technological capability, just imagine what kinds of secret weapons for assassination have been developed since. There is good evidence that technology has even been developed to cause suicidal feelings in a person.

1975 Church Committee

The above video shows a dramatic interaction between Senator Frank Church and CIA director William Colby.

The goal of the proceeding, per the Senate’s website:

“To educate the public about the misdeeds of national intelligence agencies, the committee held televised hearings in the Senate Caucus Room. After gaveling to order the first hearing, Chairman Church dramatically displayed a CIA poison dart gun to highlight the committee’s discovery that the CIA directly violated a presidential order by maintaining stocks of shellfish toxin sufficient to kill thousands. Critics saw this as evidence that the committee’s work was a vehicle for Senator’s Church presidential ambitions.”

The Senate hearing came after reports from investigative journalist Seymour Hersh on the CIA’s illicit tactics in both destabilizing foreign governments and conducting intelligence operations against American citizens. Though the hearing ended with a committee decision that Congress should keep better tabs on the intelligence community, many questions remain unanswered. Does the CIA still have this heart attack gun? Have they ever used it? And what other James Bond-esque secret weapons have they been hiding from us?

And what about the death of Andrew Breitbart?

On the night of February 29, 2012, Breitbart collapsed suddenly while walking in Brentwood. He was rushed to Ronald Reagan UCLA Medical Center, where he was pronounced dead just after midnight. He was 43 years old. An autopsy by the Los Angeles County Coroner’s Office showed that he had hypertrophic cardiomyopathy, with focal coronary atherosclerosis, and died of heart failure.

Unproven conspiracy theories arose about his death. The toxicology report showed, “No prescription or illicit drugs were detected. The blood alcohol was .04%. No significant trauma was present and foul play was not suspected.

The CIA's Heart Attack Gun - Justice Scalia

Previously:
Wikileaks Exposes The Possible Assassination Of Scalia
Andrew Breitbart Tweet Before His Death Adds Fuel To Podesta D.C. Sex-Trafficking Ring
 

JFK Murder Plot “Deathbed Confession” Aired On National Radio

 Political  Comments Off on JFK Murder Plot “Deathbed Confession” Aired On National Radio
Mar 212017
 
Former CIA agent, Watergate conspirator E. Howard Hunt names the men who killed Kennedy

JFK Murder Plot "Deathbed Confession" Aired On National Radio

The “deathbed confession” audio tape in which former CIA agent and Watergate conspirator E. Howard Hunt admits he was approached to be part of a CIA assassination team to kill JFK. It is an astounding development that has gone completely ignored by the establishment media.

Saint John Hunt, son of E. Howard Hunt, appeared on the nationally syndicated Coast to Coast Live radio show in April of 2007 to discuss the revelations contained in the tape.

Hunt said that his father had mailed cassette the tape to him alone in January 2004 and asked that it be released after his death. The tape was originally 20 minutes long but was edited down to four and a half minutes for the Coast to Coast broadcast.

Below is the audio clip of the tape:


 
E. Howard Hunt names numerous individuals with both direct and indirect CIA connections as having played a role in the assassination of Kennedy, while describing himself as a “bench warmer” in the plot. Saint John Hunt agreed that the use of this term indicates that Hunt was willing to play a larger role in the murder conspiracy had he been required.

Hunt alleges on the tape that then Vice President Lyndon B. Johnson was involved in the planning of the assassination and in the cover-up, stating that LBJ, “Had an almost maniacal urge to become president, he regarded JFK as an obstacle to achieving that.”

The three tramps arrested in the wake of the Kennedy assassination have long been suspected of being conspirators

The three tramps arrested in the wake of the Kennedy assassination have long been suspected of being conspirators

Asked if his father followed the conspiracy theories into the Kennedy assassination, Saint John said the elder Hunt did follow the work of AJ Weberman, a New York freelance writer, who in the early 70’s first accused Hunt of being one of three bums who were arrested in Dealy Plaza. The so-called bums (pictured above) were interrogated and later released by authorities shortly after the assassination. Weberman, one of the founders of the Youth International Party, the Vippies, published photographs of the tramps and found that two of them bore striking similarities to Hunt and Frank Sturgis, also named by Hunt in the tape as having been played a role in the assassination conspiracy.

Was E Howard Hunt one of the “tramps”?

Was E Howard Hunt one of the “tramps”?

Asked for his opinion as to whether his father was indeed one of the Dealy Plaza tramps, Saint John, in a stunning revelation, said one of the tramps indeed looked much like his father did in 1963 (see comparison above).

CIA operative Frank Stugis' striking resemblance to one of the "tramps".

CIA operative Frank Stugis’ striking resemblance to one of the “tramps”.

Charles Harrelson was allegedly identified as the third tramp.

Other researchers believe the “Hunt tramp” to really be Chauncey Holt, who apparently later confessed to the fact. Charles Harrelson was allegedly identified as the third tramp.

Saint John Hunt said that shortly before his death, his father had felt “deeply conflicted and deeply remorseful” that he didn’t blow the whistle on the plot at the time and prevent the assassination, but that everyone in the government hated Kennedy and wanted him gone in one way or another. Kennedy’s promise to “shatter the CIA into a thousand pieces and scatter the remnants to the wind” was being carried out and this infuriated almost everyone at the agency.

Hunt also said that his mother’s death in a December 8, 1972 plane crash in Chicago was suspicious and that there was evidence of a White House cover-up surrounding the circumstances of the alleged accident.

Investigators discovered $10,000 dollars in her luggage and Hunt alleged that his mother traveled around the country using Nixon campaign money to payoff the families of the Watergate burglars to keep them quiet about the involvement of the Nixon White House in the Watergate break-in and cover-up.

Hunt cited numerous coincidences surrounding the aftermath of the crash, including Nixon’s appointment of his henchman, Egil Krough, to the National Transportation Safety Board which investigates plane crashes, the very day after the incident.

Eyewitnesses reported that the plane exploded above treetop level before it had even hit the runway.

Hunt said that “at least 20-25 FBI members,” as well as numerous DIA agents were at the scene of the crash within minutes before rescue personnel had even arrived, and that this fact was attested to in a letter sent by the head of the Chicago FBI to investigator Sherman Skolnick.

Hunt said that his safety was guaranteed by the dissemination of the tape and that he had several copies and had mailed others to addresses both abroad and in the U.S.

“Once this information is out there’s really no point in anyone trying to do me in or do me wrong – someone may try to discredit me but I have no skeletons in my closet,” said Hunt.

As we have previously reported, the night before the Kennedy assassination, Lyndon Baines Johnson met with Dallas tycoons, FBI moguls and organized crime kingpins – emerging from the conference to tell his mistress Madeleine Duncan Brown that “those SOB’s” would never embarrass him again.

Though Brown first went public on her 21-year relationship with Johnson in the early 80’s, to this day her shocking revelations about how he had told her the Kennedy’s “would never embarrass me again” the night before the assassination are often ignored by the media who prefer to keep the debate focused on issues which can’t definitively be proven either way (or at least can be spun and whitewashed).

George Herbert Walker Bush was also pictured at the scene of the crime in Dealy Plaza.
George Herbert Walker Bush was also pictured at the scene of the crime in Dealy Plaza.

In addition, Barr McClellan, father of former White House press secretary Scott McClellan and a partner in the Austin law firm that represented Johnson, wrote in his 2003 book that LBJ was a key player in the organization of the assassination and its cover-up. McClellan’s revelations were the subject of a subsequent History Channel documentary called The Guilty Men.

 
via

Mar 182017
 
Bush fired several U.S. Attorneys to help cover up a pedophile ring being run out of the D.C. hotels involving Congressmen, Senators and reporters!

Bush Fired U.S. Attorneys To Cover Up D.C. Pedophile Ring

This was the Franklin Scandal. The Bush administration fired the agents investigating the crimes to cover it up. U.S. senators and congressmen were covering up the Dusty Foggo government lobbyist and military prostitution and pedophilia ring in Washington involving legislators, news reporters, military officers and high government officials. Alberto Gonzales and President Bush fired San Diego U.S. Attorney Carol Lam because she was probing the Dusty Foggo / Jack Abramoff D.C. sex ring.

According to a long-time senior intelligence agent the Washington, DC Hilton, Ritz Carlton and Sheraton Hotels were used for compromising House and Senate members, National Media hosts who had sex with children in a legislative and media Blackmail ring.

“The whole Republican and Democratic Parties were for sale, the House, Senate and the White House.”

“Poppy Bush and Abramoff were up to their eyeballs in this kid sh*t,” said the Federal Agent.

Supposedly convicted Lobbyist Jack Abramoff provided male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes sexual services to numerous US Congressmen, US senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.

The Washington Hilton was specifically used for sex with children because it has what the agent termed a “super secure section for VIPs that is out of public view and which reportedly employs no camera surveillance, an area able to hold around 6-10 vehicles so that no one could observe abducted, abused or drugged children flown in from other states who were coming to or leaving the hotel.” Hilton employees began to become suspicious of Abramoff’s operation, so children were moved to the Washington Ritz-Carlton according to other intelligence officials.

From Wikileaks:

The Global Intelligence Files

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered “global intelligence” company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE

Released on 2012-10-15 17:00 GMT

Email-ID 475107
Date 2007-03-27 07:27:50
From TomFlocco@cs.com
To undisclosed-recipients:

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE TomFlocco.com Foggo sex ring probe linked to forged Iraq dossier, Israeli espionage, convicted lobbyist Abramoff

According to U.S. intelligence sources, President Bush obstructed justice
last December when he had senior advisor Karl Rove and White House Counsel
Harriet Miers instruct Attorney General Alberto Gonzalez to fire eight
U.S. attorneys who were among several others conducting ongoing public
corruption and secret national security grand jury investigations
connected to an espionagea**linked prostitution / pedophile sex ring
operating at the Washington Ritz-Carlton and other DC hotels, whose
clients included U.S. senators and congressmen, elite Washington news
reporters and high government officialsa**some of whom were named by an
intelligence insider.

Central to the scandal is fired U.S. attorney Carole Lam of California who
was reportedly conducting testimony before grand juries linking indicted
former Bush CIA Executive Director Kyle a**Dustya** Foggo and convicted
Republican lobbyist Jack Abramoff to the sex ring, Israeli espionage, GOP
Under Secretary of Defense for policy Douglas J. Feith, a forged British
intelligence dossier used by Mr. Bush to deceive Americans into supporting
war against Iraq and an attempt to plant weapons of mass destruction (WMD)
in Iraq before the war via an intelligence pipeline through Dubai and
Turkey. READ MORE

 

Original story:

U.S. intelligence: Sen. Leader William Frist and reporter Robert Novak alleged as regular clients

by Tom Flocco

Washington—May 5, 2006—TomFlocco.com—A long-time top-level government agency official joined a national security expert in confirming grand jury testimony last month, revealing that male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes provided sexual services to numerous congressmen, senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.

“The whole Republican Party was for sale—the House, Senate and the White House,” said a well-respected federal agency official with impeccable credentials who declined to be named but who is familiar with testimony and sources close to the grand jury probing Jack Abramoff.

Patrick Fitzgerald

Patrick Fitzgerald

Special Prosecutor Patrick Fitzgerald’s grand jury heard several agents testify in April that the “Watergate, Ritz-Carlton and Sheraton Hotels in Washington, DC were used to compromise legislators and news-people with prostitution services, the financing of which is directly linked to the American Israeli Public Affairs Committee (AIPAC), former Israeli Prime Minister Benjamin Netanyahu, Marc Rich and Abramoff,” said national security expert Thomas Heneghan.There are no corporate media reports as to which White House officials participated in the hotel sex ring activities with House and Senate members; however, Heneghan said U.S. Senate Leader and 2008 presidential candidate William Frist was alleged to be a frequent visitor to the hotels according to U.S. intelligence agents.

Frist is reportedly a close friend of alleged Bush 43 male consort and former Knoxville, Tennessee mayor Victor Ashe according to federal agents.

Heneghan also alleged additional prostitute customers as British Prime Minister Tony Blair and former CNN host-reporter Robert Novak, both of whom were introduced into the sex-ring by GOP reporter and male prostitute Jeff Gannon, who visited the Bush White House living quarters 200 times without the assignations being recorded in visitor logs.

Jack Abramoff

Jack Abramoff

The genesis of the Valerie Plame CIA leak allegedly took place during one of Novak’s visits with an Abramoff hooker at one of the hotels according to the sources.The corruption and crimes surrounding the indicted Republican lobbyist were widespread and far-reaching enough to cause Fitzgerald to impanel a separate grand jury, often referred to by intelligence officials as the “Franklin grand jury,” which is hearing testimony and examining Abramoff linked evidence tied to the Iraq War, September 11 and related issues.

Pentagon analyst Larry Franklin was arrested for leaking classified U.S. government information to AIPAC officials Steve Rosen and Keith Weissman who reportedly leaked information to Israel concerning a controversial proposal by Department of Defense hardliners to destabilize Iran.

The federal source wishing to remain anonymous said that additional government officials are currently testifying this month before the Franklin grand jury about Abramoff, the GOP-linked prostitution ring and its ties to AIPAC.

“Photographs of politicians in compromising positions have reportedly already been used as blackmail to silence politicians who would speak the truth about the 2000 election fraud in Florida, 9-11, Iraq/yellowcake/WMD and how Jack Abramoff and Netanyahu were the pimps for the operation,” said Heneghan.

President Bush has emphatically denied that he personally knows Abramoff, despite CIA records indicating the indicted lobbyist visited the White House 200 times during the first ten months of the Bush presidency—often enough for a personal visit on every business day of each month, according to wide news reports.

Despite the daily White House visits, Bush said “I’ve never sat down with him and had a discussion with the guy,” adding, “I’m also mindful that we live in a world in which those pictures will be used for pure political purposes,” attempting to justify his unwillingness at first to release photos of him chatting amicably with Abramoff.

Fitzgerald is reportedly convinced that the Bush administration wanted Valerie Plame-Wilson’s identity as a CIA official leaked because her intelligence team had identified Israeli Mossad operatives inside Iran who were to receive weapons of mass destruction (WMD) to be delivered through Turkey and planted in Iraq to further the president’s case for war, said the intelligence expert.

“The financing for these whorehouses is linked directly to AIPAC, Benjamin Netanyahu, Marc Rich and Jack Abramoff; and the money trail ties back to American International Group (AIG), Hank Greenberg and Doug Alexander—former British Minister of E-Commerce,” said Heneghan.
In an ominous prediction, Heneghan said, “It won’t be long before the un-compromised U.S. military may have to declare a State of Emergency and re-implementation of the Constitution under a special provision of the Naval Code, which would lead to the arrest and removal of the criminal government residing at 1600 Pennsylvania Avenue.”(Bush and his thugs)

According to Heneghan, the Abramoff congressional sex ring is tied to the SunCruz Casino scandal, secret accounts at Riggs Bank and Crozier Bank, the 9-11 “hijacker” Venice, Florida flight schools, and former U.S. ambassador to Italy Mel Sembler and Doug Alexander—both of whom have been linked to the reported Florida 2000 election fraud—all of which is tied to a financial trail that connects narcotics trafficking to Al Qaeda and the congressional sex ring.

MSNBC host and former congressman Joe Scarborough, subject of a recent TomFlocco.com story, “is now cooperating with federal investigators in the Abramoff matter which has led the probe to the doorsteps of the AIPAC whorehouses now operating in Washington, DC,” said Heneghan.

The intelligence expert told us “Scarborough told federal investigators that he now believes his female staff member was murdered in his congressional office to silence her regarding knowledge of Alexander, Sembler, Katherine Harris, Jeb Bush and the Florida election 2000 coup d’ etat.”

 
via

Obama And Hillary Sending Out Robo-Calls To “Resist” President Trump

 Political  Comments Off on Obama And Hillary Sending Out Robo-Calls To “Resist” President Trump
Mar 122017
 

Obama and Hillary Robo-Calls Urge Americans to “RESIST TRUMP”

Obama And Hillary Sending Out Robo-Calls
In what’s shaping up to be a highly unusual post-presidency, Obama isn’t just staying behind in Washington. He’s working behind the scenes to set up what will effectively be a “Shadow Government” to not only protect his threatened legacy, but to sabotage President Trump and his administration.

He’s doing it through a network of leftist nonprofits led by Organizing for Action. Normally you’d expect an organization set up to support a politician and his agenda to close up shop after that candidate leaves office, but not Obama’s Organizing for Action. Rather, it’s gearing up for battle, with a growing war chest and more than 250 offices across the country.

Since Donald Trump’s election, this little-known but well-funded protesting arm has beefed up staff and ramped up it’s recruitment of young liberal activists, declaring on its website, “We’re not backing down.” Determined to salvage Obama’s legacy,” it’s drawing battle lines on immigration, ObamaCare, race relations and climate change.

Obama is intimately involved in Organizing for Action operations and even tweets from the group’s account. In fact, he gave marching orders to Organizing for Action foot soldiers following Trump’s upset victory.

Here is more evidence that Obama is working behind the scenes to take down Trump.

There have been circulating claims on Twitter of automated calls from former President Barack Obama and Hillary Clinton to several different people.

People are claiming these calls are asking them to “Resist” President Donald Trump.

Obama And Hillary Sending Out Robo-Calls

Obama And Hillary Sending Out Robo-Calls

Obama And Hillary Sending Out Robo-Calls

Obama And Hillary Sending Out Robo-Calls

Obama And Hillary Sending Out Robo-Calls

Obama And Hillary Sending Out Robo-Calls - Scott Baio

Barack Hussein Obama, Hillary Clinton, Valerie Jarrett, and George Soros are determined to destroy the man elected by the American people. How are political “leaders” in the United States allowed to be openly seditious, and get away with it? By examining the legal definition of sedition, it is clear that establishment politicians and mainstream media outlets are in violation of this law.

Seditious conspiracy… it is happening!

18 U.S. Code § 2384 – Seditious conspiracy
18 U.S. Code § 2384 - Seditious conspiracy

Click to enlarge

 
Source…