Sep 222017
 

Crowdstrike Payments Coincide With Deaths Of Seth Rich, Shawn Lucas

DNC Payments To Crowdstrike Coincide With Deaths Of Seth Rich, Shawn Lucas

The cyber firm Crowdstrike has been one of the main proponents of allegations that Russia interfered in the 2016 American presidential elections using their cyber capabilities. The analysis performed by Crowdstrike was relied on almost exclusively by the Democratic National Committee to establish their claims of “Russian hacking.” The founder of Crowdstrike is also tied to the Atlantic Council, a think tank supported by George Soros which has been accused of accepting funds in exchange for support of favored policy positions as well as promoting disinformation and propaganda attacks against anti establishment figures.

The Federal Election Commission site shows a huge DNC payment to Crowdstrike the day after Seth died. There were also payments to them starting several months before that, which lined up with the dates when the DNC announced they hired them to “secure their systems and catch the leaker” (fabricate the Russian hackers story).

From America First Media Group:

During the 2016 Presidential Election, the biggest story became how Russia “hacked” the election. The “17 intelligence agencies” that Hillary Rodham Clinton cited all relied on word from a contracted company, Crowdstrike.

Crowdstrike is a technology company that specializes in cyber-security. Not only is there conflict of interest with Crowdstrike receiving payments, campaign data shows some incredible correlations with the payments that were made.

All payments cited below are part of the Federal Election Committee data of campaign spending on the www.fec.gov website.

The first payments made were preemptive measures on May 5th, 2016 when the DNC was looking to figure out where the breach of security was. Payments made on May 5th, 2016 of $7,650.00 and $1,462.50 were likely paid for Crowdstrike to install their Falcon software, a stellar technology security suite that would identify any internal or external security breach.

The final email on Wikileaks from the DNC is dated May 25th, 2016. Crowdstrike would have had complete knowledge of the party that ripped the emails from the server.

The next payment that was made to Crowdstrike occurred on July 11th, 2016 for the amount of $98,849.84. The relationship to this date happens to be the day after DNC Data Director of New Voter Registration Seth Rich was murdered.

The final payment to date is August 3rd, 2016. This coincides with another murder in the District of Columbia. Shawn Lucas, who died on August 2nd of last year, was the DNC Process Server and close friend of Seth Rich. The payment on August 3rd included two checks, one for $113,645.77 and the other for $4,275.00.

We find it highly coincidental that both of these payments came within 24 hours of two high profile murders in Washington D.C., which both have connection to the DNC.

DNC Payments To Crowdstrike Coincide With Deaths Of Seth Rich, Shawn Lucas

The initial and final payment was referring to Technology Consulting and Technology Infrastructure Maintenance, linked here. It does not include the licensing of the software under the description of Data Services Subscription.

 

 

DNC Payments To Crowdstrike Coincide With Deaths Of Seth Rich, Shawn Lucas

 

 

 

 

Sep 192017
 

The FBI was Wiretapping Manaford between 2014 and 2016… but dropped the investigation because they found nothing. Then they reopened it again a few months later, when he joined the Trump Campaign.

Obama Wiretapped Paul Manafort Before And After The Election

Even CNN is reporting this. They only report the truth when they have to cover up a bigger lie. Wonder what that bigger lie is?

From CNN:

US investigators wiretapped former Trump campaign chairman Paul Manafort under secret court orders before and after the election, sources tell CNN, an extraordinary step involving a high-ranking campaign official now at the center of the Russia meddling probe.

The government snooping continued into early this year, including a period when Manafort was known to talk to President Donald Trump.

Some of the intelligence collected includes communications that sparked concerns among investigators that Manafort had encouraged the Russians to help with the campaign, according to three sources familiar with the investigation. Two of these sources, however, cautioned that the evidence is not conclusive.
 

Remember: James Clapper explicitly said there was no tap on Trump’s campaign. James Clapper out-and-out LIED. Make sure as many people as possible see this!

Obama Wiretapped Paul Manafort Before And After The Election

This is evil. They are that confident their crimes will go unpunished.

He lied to Congress and the entire country about the NSA Metadata. This is literally the Deep State personified and he needs to be in prison.

 

 

Sep 182017
 

Hillary’s IT guy, Paul Combetta, was caught asking how to destroy evidence on Reddit. He received immunity, like most of Hillary’s underlings, even though he lied to investigators.

Reminder: Hillary's IT Guy, Paul Combetta Received Immunity

After news broke that his accounts were found, users on Reddit watched in real time as they disappeared. Thankfully his request was archived beforehand.

Paul Combetta, a.k.a. u/stonetear, was one of two Platte River Networks (PRN) employees actively managing Clinton’s private server during her tenure as Secretary of State.

In July, 2014, the State Department requested that Clinton provide all her work-related emails, including the e-mails on her private server, as part of an investigation.

On July 24, 2014, Combetta went to Reddit for help on behalf of his “VERY VIP” client, asking how to strip an e-mail address “from a bunch of archived email(s)…”. Although it is usually assumed that it was Hillary’s address that Combetta wanted to remove, some people speculate that it was actually Obama’s.

Remove or replace to/from address on archived emails?

When Combetta’s Reddit account was discovered in 2016, Combetta deleted his entire post history, along with his account.

Even though Combetta destroyed evidence and lied to investigators, the DOJ never revoked the immunity they granted him in exchange for truthful testimony. No one was ever prosecuted in relation to Hillary’s illegal private server.


Sources:

 

 

 

Sep 072017
 

Does Google exist purely to filter and control information that the general public can access – filtering out the truth by labeling it ‘Fake News’?

Is Google A Creation Of United States Intelligence Community?

The United States intelligence community may have funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Google could be the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘Information Superiority’.

From New Eastern Outlook:

If you need proof beyond the obvious, Google’s 160-page handbook tells us all exactly how they plan to spoon feed us only “their” news. The lengthy handbook is a heavy read for the average person, but the book does lay out an Orwellian machination unlike anything seen since the Nazi propaganda machine of Hitler. Pay close attention to the “instructional” on page 108 where Google dictates who does and does not meet rating criteria. The section under Fails to Meet (FailsM) is a steamrolling of the free press, and suggested hiding certain kinds of sites:

“Pages that directly contradict well established historical facts (e.g., unsubstantiated conspiracy theories), unless the query clearly indicates the user is seeking an alternative viewpoint.”

Google FailsM

As per usual, Google has obscured its real intentions with the idea some super smart algorithm is “filtering” or “learning” results to help your life be better. Once again Google supposes to do “what is good for us” by destroying some sources and propping up others. Using terms like “search quality rating guidelines” and “page quality rating guidelines” the little Machiavellis at Google provide justification for controlling what you see and read on the web. Censorship and monopolization of internet information and business – this is the case against the Mountain View boys this time.

Then there’s the section concerning how Google will rank the best of the best news sites entitled “A High Level of Expertise/Authoritativeness/Trustworthiness (EAT)”. The acronym should clue you that Google search users are about to be fed some bullshit truth. “High Quality Pages” for the Google oligarchs means that either the page owner pays Google through the mouth, or that the site in question serves Google’s masters well – period. At the top of this matrix of sources are newspapers (High News 1) like The Washington Post and New York Times, followed by the articles within those pages (High News 2). On down the list of authority pages are government sites like the US State Department and White House, and then pages categorized (believe it or not) “High Humor”. So, Google has factored out the importance of truth or even the importance of the news story itself, in favor of “who” wrote the story and the “reality” Google wants you to accept – Big Brother’s network – end of story.

Melissa Dykes of Truth Stream Media made a video about the new Big Brother effort, and Government Slaves did their take as well. And the latter even suggests alternatives to using Google Search for those who refusing the totalitarian tendencies we see headed our way these days. For people who had rather boycott the imminent evil such as Yandex, and DuckDuckGo. Government Slaves also lists 400 sites for independent news outside Google’s MATIX. My advice for everyone is to start making the transition away from Google and Facebook now. My own vast experience in dealing with these tech people has revealed people with no morals whatsoever, people willing to do anything necessary to perpetuate their dominance in digital. Google has destroyed millions of people’s livelihoods, broken its own code, lawyers itself around anti-trust and fair practice rules, avoided taxes, and colluded against the people of the United States with the intelligence agencies. All these assertions are not just this writer’s ramblings. Back in 2014 John W. Whitehead wrote about the NSA and Google for the Huffington Post:

“Just look around you. It’s happened already. Thanks to an insidious partnership between Google and the National Security Agency (NSA) that grows more invasive and more subtle with every passing day, “we the people” have become little more than data consumer commodities to be bought, sold and paid for over and over again.”

August 29th the notorious Zero Hedge creator, Tyler Durden wrote a piece entitled “Why Google Made The NSA”, which revealed a project called INSURGE INTELLIGENCE, a crowd-funded investigative journalism project that had released a story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. You read that correctly. My past assertions that Sergey Brin and Larry Page were “lifted up” by unseen money were probably correct. While I presumed George Soros or Rockefeller being behind, it’s conceivable Uncle Sam was the spook in the woodpile. The Zero hedge story delves deep into a “deep state” we never imagined in our worst nightmares. The report unveils how Pentagon Highlands Forum’s more or less taking over tech giants like Google to pursue mass surveillance. Furthermore, the report shows how the intelligence community has played a key role in secret efforts to manipulate the media and the public. The endless crisis and war we find ourselves in, is in large part because of the efforts of Google and the other technocratic institutions. In on section the author frames how the Obama administration really consolidated this “Big Brother” control:

“Under Obama, the nexus of corporate, industry, and financial power represented by the interests that participate in the Pentagon Highlands Forum has consolidated itself to an unprecedented degree.”

These people refer to themselves as “the gatekeepers”. Their arrogance is only exceeded by their amoral agnosticism. The successes of the information age, Silicon Valley’s dubious venture capital bonanzas, the mysterious ways in which fairly ordinary innovators were propelling into the limelight warns us to the underlying swamp Donald Trump described. But it is the immensity of the network that should clue us. Imagine a new president taking office and fending off attacks as best he could, only to discover that the whole machine of the US government being under such a controlling influence.

 

Aug 312017
 

WikiLeaks Vault 7 is about a global hacking program being covertly run by the CIA

WikiLeaks Vault 7: Projects

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare on anyone it chooses. The files, dated from 2013–2016, include details on the agency’s software capabilities, such as the ability to compromise cars, smart TVs, web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA), and the operating systems of most smartphones (including Apple’s iOS and Google’s Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.

WikiLeaks Vault 7: Projects

 
 
 

Sebastian Gorka Gone From The White House

 Political  Comments Off on Sebastian Gorka Gone From The White House
Aug 262017
 

Is something big about to happen? Sebastian Gorka, has resigned from the White House

Sebastian Gorka Gone From The White House

My take on what is going on. Something big is happening. If you are going to take down the most powerful people in the world, you get your friends to safety and then you General up. Make sure you have the full backing of the largest and strongest Army in the world.

From The Federalist:

In a blunt resignation letter, the national security and counterterrorism expert expressed dissatisfaction with the current state of the Trump administration. “[G]iven recent events, it is clear to me that forces that do not support the MAGA promise are – for now – ascendant within the White House,” Gorka wrote. “As a result, the best and most effective way I can support you, Mr. President, is from outside the People’s House.”

Gorka’s letter expressed unhappiness with the direction the Trump administration’s foreign policy has taken, as signaled by the president’s recent speech on Afghanistan:

“Regrettably, outside of yourself, the individuals who most embodied and represented the policies that will ‘Make America Great Again,’ have been internally countered, systematically removed, or undermined in recent months. This was made patently obvious as I read the text of your speech on Afghanistan this week…

“The fact that those who drafted and approved the speech removed any mention of Radical Islam or radical Islamic terrorism proves that a crucial element of your presidential campaign has been lost…

“Just as worrying, when discussing our future actions in the region, the speech listed operational objectives without ever defining the strategic victory conditions we are fighting for. This omission should seriously disturb any national security professional, and any American who is unsatisfied with the last 16 years of disastrous policy decisions which have led to thousands of Americans killed and trillions of taxpayer dollars spent in ways that have not brought security or victory.”

 

Aug 122017
 

At the same time the Guccifer “Hack” was taking place, Joe Biden was hosting a meeting with 18 Ukrainians. Very unusual for him. Warren Flood was a consultant for Biden. Warren Flood was the name the Microsoft account was registered to on the Guccifer documents.

White House Meetings On Ukraine Coincide With Time Of Russian Fingerprint Fabrications

More Ukrainian connections. Also be sure to watch the video below where Imprisoned Romanian hacker ‘Guccifer’ tells Fox News that ‘Guccifer 2.0’ could be the U.S. State Department.

From Adam Carter [April 29th, 2017]:

In my research to investigate the real identity of Guccifer 2.0, I discovered that the name Warren Flood applied to more documents than had originally been reported and highlighted the unusual nature of those documents both in terms of the metadata and the RSIDs (and Russian Stylesheet that existed in multiple documents even before the content in each document did) and explained that this demonstrates an effort to try to discredit Wikileaks by blaming leaks on Russian hackers.

White House Meetings on Ukraine Coincide With Time of Russian Fingerprint Fabrications

Considering where copies of Microsoft Word installed by Flood (highlighted in the photo above with Biden) might exist besides on computers he owns, I considered his past role as Sen. Joe Biden’s Technology Director (as noted on his Linked-In profileand thought one place to look for interesting activity would be computers residing in Biden’s office or generally at the White House.

So, I wondered who may have visited Biden that day around that time. I thought I’d check out visits to the White House hosted by Biden, wondering whether there’d be any interesting activity anywhere near 1:38pm on June 15th 2016.

It turns out that Biden was hosting visits from a number of Ukrainians around that time, on that date. To see how frequent this sort of activity occurred I checked the whole of June. – It seems such visits were not a regular occurance.

(Times below are appointment times, some individuals turned up before their 2pm appointment)

White House Meetings on Ukraine Coincide With Time of Russian Fingerprint Fabrications

An attempt to quickly identify visitors in June showed the following had a Ukraine connection:

White House Meetings on Ukraine Coincide With Time of Russian Fingerprint Fabrications

While this doesn’t prove anything, it certainly is a curious coincidence to stumble upon while looking for activity of people that might have had a motive (or helped with an effort) to frame Russia.

US visitors that day also have ties back to events surrounding the Ukrainian 2014 revolution and/or reporting on it (with the exception of Kuklish who is an English-Ukrainian translator) and most had worked or were working in the State Department.

It’s worth nothing that Nuland and Pyatt were both embroiled in a diplomatic crisis in 2014 when a conversation they had was posted to YouTube showing that the US was interfering in Ukraine’s politics (The State Department and the White House blamed Russia’s vice-president Dmitryi Rogozin for the leak.)

I’m not going to get into speculation. I’ve let journalists who have written extensively on the Ukraine coup know about this and will leave this up to them to pursue, if they wish to.


UPDATE [May 2nd]: A closer look at the actual booking/arrival times, room numbers, other visits, etc. shows that, on the 15th, there were effectively 2 meetings. One of which had at least 18 individuals attending (Stoliarchuk is listed at 1:30pm and 2:00pm) and another with at least 4 attending.

White House Meetings on Ukraine Coincide With Time of Russian Fingerprint Fabrications


 

‘Guccifer’ to Fox News: ‘Guccifer 2.0’ is not Russia, it’s the US Government

Imprisoned Romanian hacker ‘Guccifer’ talks exclusively to Fox News about the DNC email hack, Hillary Clinton’s private email server and claims ‘Guccifer 2.0’ could be the U.S. State Department.

 

Archive.
 
 
 

A Timeline Of Events Surrounding The Russian Hack Narrative

 Political  Comments Off on A Timeline Of Events Surrounding The Russian Hack Narrative
May 182017
 

A Timeline Of Events Surrounding The Russian Hack Narrative

An awesome timeline by reddit user RulerOfSlides:
Russia-Wiretapping hypotheses only timeline

I think I’ve got some of this worked out. The pieces are really starting to come together. First, what we learned recently:

  • Andrew McCabe gets manipulated/bribed into hiring a former MI6 agent to “research” (read: bullshit) the Trump dossier. Ties directly to the Clinton campaign (his wife received money from them or donated, iirc).
  • Hillary Clinton was confirmed to have access to intelligence and classified files after she left office as Secretary of State.
  • CrowdStrike recently redacted their statements that were used to support their claims of Russian interference in the election. They also were the only ones to look at the DNC’s servers; the FBI was prohibited to do so by the DNC itself.
  • Hillary Clinton and the head of CrowdStrike, Dimitri Alperovitch, were both ranking members of the Atlantic Council, a Soros-financed think tank.
  • Susan Rice requested that all intelligence relating to the Trumps (his whole family), gathered across a period of several years going back to 2013 (possibly earlier) be unmasked.
  • Jeh Johnson may also have been involved in unmasking Trump-related intelligence, but that connection is tenuous at best.
  • EDIT: I neglected to mention Evelyn Farkas, who accidentally disclosed the fact that the Obama administration had been spying on members of Trump’s campaign, as well as some of his friends is also a member of the Atlantic Council. She also had worked under the Clinton campaign since around 2015, and in her previous job dealt with Russia/Ukraine foreign policy.
  • EDIT II: Cernovich reported a few moments ago that three people close to Obama who had the authorization to unmask intelligence reports were Susan Rice, John Brennan, and Loretta Lynch – all three of whom were key players in the Russia narrative.
  • EDIT III: Developing possibility that Flynn and Trump may have cooperated to catch the spying apparatus/”Council of Evil” that Obama left behind, going off of a foreign intelligence tip. I have incorporated this into the timeline.
  • 4/3/2017 EDIT IV: Bloomberg now reporting on Rice’s unmasking efforts. The big takeaway here is that Nunes made a visit to the White House before his press conference to view the National Security Council systems that held the logs of Rice’s requests to unmask people that intelligence had been gathered on. I think this explains why Bannon was added to the NSC – Trump has eyes and ears in an area that he would otherwise have been blind to. It probably aided in gathering information about what was going on, too. (It’s also funny to see the media clinging to the literal definition of “wiretapping”). Adam Schiff also viewed these logs, hence his decided reluctance to properly comment on what was found.
  • 4/3/2017 EDIT V: Adding some small additional details that I uncovered from digging through the Podesta files. Podesta ID #34639, which better detectives than I concluded that this showed an effort at tying up Trump, Assange, and Russia. The screenshot is dead, sadly, but this happened in March 2016. Podesta ID #17020 also establishes a tenuous but still-present connection between Podesta and the Atlantic Council.
  • 4/4/2017 EDIT VI: As of a few hours ago, we now know slightly more about what happened with the fake Trump dossier. Steele was not paid directly by the FBI as originally speculated – that deal appears to have fallen through, but McCabe was closely involved in negotiating that payment, leaving the Clinton connection valid. The firm involved with it, Fusion GPS, began working on the dossier in September 2015, hired by an anti-Trump Republican donor. That deal was broken off some time after that, and then a Democratic supporter of Clinton started paying Fusion GPS to keep going, and this is the point where Steele was brought into the project.
  • 4/4/2017 EDIT VII: Contents of one of the Department of State emails (sent on November 21, 2009) recently declassified by the FBI indicate that Clinton’s infamous server was established to work around the intelligence-gathering systems that would later be used against President-elect Trump, or an ancestor to those systems. I unfortunately don’t remember who originally found this; I can’t be credited with this discovery – only integrating it into the timeline.
  • 4/5/2017 EDIT VIII: Apparently Susan Rice had a lot of friction with, of all the agencies, the NSA. One fellow ‘pede summarized this very nicely. I have a feeling that this gives Rogers adequate motive to go to Trump Tower about the unmasking on November 22 – she was horribly unpopular, possibly even coming to blows with Rogers himself.
  • 4/5/2017 EDIT IX: New information seems to implicate the one and only John Brennan as the man who ordered enhanced surveillance on key Trump allies, including General Flynn, Erik Prince (head of Blackwater and a top CIA critic), and Sean Hannity. Brennan was also the one to order Susan Rice to unmask those Trump allies. I’ve placed this in its rightful spot on the timeline.
  • 4/5/2017 EDIT X: Man, today is the gift that keeps on giving. Fox published an article describing that the intelligence reports involved here were uncomfortably detailed, but that’s not what I’m interested in. This report gives us a better understanding of when the unmasking campaign began, (concurrent with the Obama administration’s “investigation” into the DNC leaks) and tells us that only one agency would have the capability to fully trace back the paper trail that led back to Rice, as well as the fact that only one agency could approve unmasking requests – the NSA.
  • 4/6/2017 EDIT XI: Further information about Clinton’s continued access to classified material even after leaving her post as Secretary of State in 2013 has surfaced, for the purpose of “writing her memoir” (emphasis on air-quotes mine). Beyond Clinton, six staffers had access to the same classified intelligence. I have a feeling that the six people are on this list – specifically, the five people involved with management and strategy (Mook, Benenson, Renteria, Podesta, and Abedin) and Cheryl Mills. This would explain classified information ending up on Weiner’s laptop, and Mills’ request for partial immunity in the email investigation back in September.
  • 4/6/2017 EDIT XII: At the risk of making this seem implausible by not citing sources (who I’d like to keep private, though they are an active member of this community I have received permission to cite this source), it seems likely that Nunes discovered that he himself was unmasked by Brennan, McCabe, and/or Obama’s combined orders (there are three points where unmaskings were ordered, it would seem – by McCabe before the election, by Obama starting in December, and then again by Brennan after the new intelligence-dissemination rules went into effect in January) – that’s why he stepped away from the investigation. Nunes was on the Trump transition team as of December 1, 2016.
  • 4/8/2017 EDIT XIII: New Wikileaks release indicates that Guccifer 2.0, an individual supposedly responsible for leaking the DNC emails to Wikileaks (in addition to other doccuments) was neither Russian (with 97% certainty) and may have been a staffer named Warren Flood (or someone that stole his computer). Wikileaks does not indicate that the DNC knew Seth Rich was the leaker, however, because when Rich was discussed in Guccifer 2.0’s messages to a certain actress, he had been dead for over a month.
  • 4/12/2017 EDIT XIV: CNN accidentally admits (screenshot) that John Podesta had ties to Russia via the Podesta Group. The Podesta Group represents, among other things, the interests of Sberbank of Russia, which itself is owned by the Central Bank of Russia – which is part of the Russian government. The filing of the Podesta Group as a foreign agent is highly suspect on top of that. Perhaps the Russia narrative originated not out of revenge, but simply because the Clinton campaign (itself tied to Russia) assumed that Trump’s campaign was doing the exact same thing they were.
  • 4/18/2017 EDIT XV: I have been informed of an excellent summary of Obama-era wiretapping activities. Of note is that the single successful FISA request revolved around Carter Page’s alleged Russian connections, likely stemming from very close ties to the Russian government. This opened the door to Trump himself being officially spied on.
  • 4/18/2017 EDIT XVI: CNN accidentally admits, for the second time, more evil things. The Steele dossier was used by the FBI to justify FISA approval of surveillance of Carter Page. Bear in mind that Steele was under negotiation to be paid by Deputy Director McCabe for the dossier, and that Comey himself informed the Trump administration of what was in it. What does this mean? This means that the FBI knew it was full of shit (also why Steele was never paid), but it was still used in a court of law as evidence. Page is currently being leveraged because, being a Russian sympathizer, he is the weakest link in the Trump campaign and the most easily painted as a pro-Russian agent – and he was far removed from Trump’s inner circle. This is the length they had to go to to find some kind of Russian ties – faking evidence and hunting for Russian sympathizers, the latter of which was just found recently.
  • 4/23/2017 EDIT XVII: Kind of small, but still important – the Failing NYT confirmed that the FBI indeed attempted to pay Steele $50,000 for the dossier – if he could prove the claims in it. It appears that Carter Page’s visits to Moscow in 2016 – though they were innocuous, and though Page never met with Trump – were the legal foundation for much of the “Russian ties” claims (used for the FSIA request). The source of the Page-Russia connection, beyond Steele, was identified as Sergei Millian, a particularly shady Belarusian-American businessman. Page was also detested by the Trump campaign, and a cease-and-desist for calling himself a Trump advisor was sent to him in December 2016.
  • 4/25/2017 EDIT XVIII: Christopher Steele admitted that the claims in his dossier were 100% unverified. Apparently he’s going to court over the fact that the contents of the dossier were printed; there’s also some additional details of interest in here. The “hacker” that Steele claimed was involved in all this was Aleksej Gubarev, who runs a web-hosting company, XBT Holdings. Additionally, it seems that it was not Steele himself who released the dossier to the media; instead, Fusion GPS took it and leaked it to try and damage the Trump administration’s credibility. Steele did have less formal communications with the media, though. We now have a place for the meeting between Steele and the FBI – Rome, Italy, at some unknown time.
  • 5/13/2017 EDIT XIX: Big league news, if true. A Russian citizen has come forward and claimed that the FBI wanted to frame him for the DNC leaks, offering US citizenship and a dismissal of charges in return. The FBI apparently visited him several times – notably “mid-November” 2016, and February 7, 2017. He was arrested on unrelated charges on October 5, 2016. The relevant dates have been added.
  • 5/15/2017 EDIT XX: The family of Seth Rich hired a private investigator, who today announced that there is evidence he was in contact with Wikileaks prior to his death. There is evidence, too, that local police were told to step back from the investigation into his murder.
  • 5/17/2017 EDIT XXI: More information from one of the chans about Seth Rich. Also some potentially interesting deaths that occurred around the same timeframe – Joe Montano, the DNC chairman before Wasserman-Schultz and aide to Tim Kaine (July 25, 2016); and Shawn Lucas, head of a class-action lawsuit against Wasserman-Schultz for rigging the DNC primary (August 2, 2016).
  • 5/17/2017 EDIT XXII: Lucky timing on this. I was just about to go to bed, and happened across someone else on this domreddit linking Podesta email number 25651, which describes the best approach to stopping Trump as leveraging his “bromance with Putin.” This was sent by Brent Budowsky, a Huffington Post contributor and a writer for The Hill. Looks like Syria might have been one of the deciding factors on getting the Clinton campaign to turn against Russia. What is more significant is that this email was sent on December 21, 2015 – a whole three months before the earliest construction of the “Russian hacker” narrative.

My timeline, approximately:

  • EDIT XXII: The December 21, 2015 email exchange between Bret Budowsky and John Podesta occurs, touching upon ISIS and the continuation of Obama-era foreign policy surrounding Syria, in which Budowsky advises Podesta to make a departure from then-current policy for fear of it becoming political baggage. A notable quote: “But at the least she should not be branding and infecting herself with Obama’s policy towards Syria and ISIS by offering such high and direct praise for it.” I suspect this is the genesis of the Russia narrative, and the reason why the Clinton campaign went so far down the anti-Russia path.
  • The Obama administration most likely had been gathering intelligence on every GOP candidate – either as part of their expanded intel operations or as an intentional, focused sabotage plan. This information would likely have been contained in the President’s Daily Briefings, which Nunes is rumored to have investigated on March 22 – just before making the announcement that Trump’s wiretapping claims were correct. EDIT IV: Though Nunes may have viewed the President’s Daily Briefings at some point in his investigation, or intends to, it seems that the linchpin for Nunes was viewing the logs of Rice’s unmasking attempts.
  • Clinton got wind of this investigation through her ability to access intelligence files and other means (i.e., direct ties to people in DC who were active in intelligence-gathering). This is where the “Russian hacker” narrative began, possibly bolstered by her relationship with Alperovitch – who is a Russian expat and absolutely loathes Vladimir Putin. She may have built a narrative out of CrowdStrike’s report, hopeful that the intel-gathering by the Obama administration would uncover further information about Russian interference. EDIT: Evelyn Farkas, who had been involved in Russia/Ukraine affairs, may also have been involved with this, again through the Atlantic Council. EDIT V: Upon digging through the Podesta files, it would seem that the Trump/Russia connection narrative was constructed just before March 16, 2016. The Atlantic Council had a meeting about “combating far-right extremism in Europe” on March 22 – less than a week later. I think it’s possible that the Atlantic Council meeting on the 22nd was when the Clinton campaign, represented by John Podesta (who was in DC the day before the meeting, according to this – Clinton herself was in Washington state) exchanged information with CrowdStrike. EDIT VII: Since we can now establish that Clinton was aware of a covert spying system as far back as 2009, it’s possible that she counted on that same system to uncover some kind of Trump/Russia connection. EDIT XI: Now we also know that there’s a strong possibility that six of Clinton’s staffers also had access to classified intelligence – I wouldn’t be surprised if they were involved in dissemination, either.
  • On June 12, 2016, Julian Assange teases the release of the DNC’s emails, some three weeks after the latest possible date they could have been collected.
  • June 14, 2016 is the earliest date that has been connected to the official release of CrowdStrike’s report on the DNC “hack.” It may have been released the day after, too.
  • EDIT XIII: Guccifer 2.0 emerges onto the scene on June 15, 2016, and claims responsibility for the DNC hacks that were teased by Julian Assange barely three days earlier. Signs indicate that this may have been some kind of damage control by the DNC, coming off of the Podesta-Atlantic Council-CrowdStrike exchange that likely happened the previous month – basically, releasing “additional” information while lazily incorporating Russian “fingerprints” (i.e., writing the metadata in Cyrillic) into those releases as a means of shifting the blame to Russian influence. This is the second-earliest point at which “Russian ties” had been discussed publicly, and I have a feeling that the DNC took marching orders from the Clinton campaign (who had a discussion about Trump/Putin/Assange ties two months before, likely because they sensed a threat) in trying to sabotage Trump. Based off of some things that Guccifer 2.0 misinterpreted, it seems that he had zero connection to CrowdStrike’s report aside from reading it, so some insulation existed between the DNC and Clinton campaign.
  • EDIT XX: On July 10, 2016, Seth Conrad Rich, a DNC staffer, is murdered in Washington D.C.
  • On July 22, 2016, Wikileaks begins the release of 44,000 emails from the DNC spanning a period from January 2015 to May 25, 2016.
  • EDIT III: Oh boy. This – roughly July or August – is about the point at which, should the possibility laid out by Jonathan Langdale be correct (which Flynn’s apparent “thumb’s-up” lends extra credence to), Russia was responsible for approaching the Trump campaign and making them aware of the surveillance that was going on. Basically, Trump and Flynn laid out a trap for the “Council of Evil” (which I’ve come to call the Lynch/Rice/McCabe/Brennan/Clapper circle that seems to have been the main people involved with the Russia narrative) and the deep state, in which Flynn would be made to seem untrustworthy in order to draw out and embolden leakers. They couldn’t do anything about it, like go public with it, because it would jeopardize their chances of winning the election and thus prevent the campaign from investigating it further. Additionally, the FBI’s actions with Clinton made them seem untrustworthy; it was readily obvious as well that the DoJ was compromised after Bill’s infamous meeting with Lynch on the tarmac – meaning they had nowhere to turn but inwards.
  • CrowdStrike’s report, which formed the backbone of Russian hacking allegations, found its way through the three-letter agencies and eventually indirectly caused the last FISA request over a Trump-controlled server to go through. [EDIT III: This may have been motivated by Russia’s detection of Trump’s surveillance as hypothesized by Langdale] Several previous requests had been made, probably because the former (above EDIT III) bullet point happened in around June or July. The FBI found nothing while investigating it. EDIT II: Loretta Lynch’s ability to view unmasked intelligence documents may have played a role in allowing the FISA request to go through – likely as a way of building evidence for the brewing Russian hackers narrative.
  • EDIT XXI: On August 9, 2016, Wikileaks officially offers $20,000 for information about Seth Rich’s murder.
  • EDIT VI: At around this point, the funding for Fusion GPS to create the Trump dossier dries up, shifting away from the unknown Democrat. Clinton, fearing that the Russian hacking narrative is on shaky grounds, indirectly pays off Andrew McCabe to come up with some kind of dirt on Trump. McCabe then begins negotiating hiring Fusion GPS, who has brought Christopher Steele, a former MI6 agent, into their investigation. The money never makes it to Fusion GPS, and Steele spends several months “working” on it, sends it off to the mainstream media, and it floats around for several months until Buzzfeed publishes it as a means of undermining the Trump administration. Bear in mind that, by this point, the dossier had been in development for over a year.
  • McCabe believes Steele’s then-incomplete dossier, as well as CrowdStrike’s claims, and then begins to plan a soft overthrow of the Trump administration starting with the weakest link – Mike Flynn. Flynn is later forced out due to his own faults, [EDIT III: My original assumption here may be untrue, and this may have been part of a grander plan] but the assault doesn’t stop there. Comey may have been aware of McCabe’s actions, but ignored them. [EDIT XVII: This has been basically confirmed – the FBI knew of the dossier.]
  • EDIT XIX: Yevgeniy Nikulin, a Russian national, is arrested on October 5, 2016 by the Russian government over unrelated hacking charges (on the order of the US government). Two days later (October 7), the DNI (Clapper) and DHS (Jeh Johnson) jointly stated that Russia was behind the DNC server hack, as well as the Podesta leaks.
  • On October 7, 2016, Wikileaks begins releasing the Podesta emails, covering a period from approximately 2006 to March 21, 2016.
  • In the third Presidential debate on October 19, 2016 Clinton makes the first public accusation that “Russian hackers” interfered with the election.
  • This is about the point where the media begins to go crazy over the “Russian ties” allegations, bolstered in some form or another by the CrowdStrike claims, Steele’s dossier, and quite possibly leaks from McCabe’s anti-Trump crusade in a kind of Deep Throat Jr. situation. I have a suspicion that McCabe and his FBI-based allies (the “McCabe 16” mentioned in the True Pundit article) were the source of the narrative. EDIT II: The CIA under Brennan – because of his access to unmasked intelligence reports – may also have been involved with leaks to the media, especially via the Washington Post, which some have deemed the “mouthpiece of the CIA.”
  • On October 22, 2016, Gavin MacFayden – Seth Rich’s rumored contact at Wikileaks – dies of lung cancer in London. He had apparently been ill for quite some time (I personally don’t consider his death suspicious – only that it makes it harder to piece together the truth).
  • EDIT IX: This is approximately Election Day. If the anonymous sources are indeed correct, then this is the point at which CIA director John Brennan orders enhanced surveillance on people in Trump’s inner circle – like Mike Flynn (already targeted by the FBI under McCabe), Erik Prince, and Sean Hannity. He may have also provided Rice with the specific documents or directions to find them that were later disseminated at the Obama administration’s behest starting sometime in December. Flynn was chosen due to the ease at which he could be leveraged; Hannity was chosen due to his apparent close ties to both Trump and Julian Assange, and Prince may have been focused on due to a long-standing personal feud with Brennan. The enhanced surveillance continues from November 8 to January 20. Note as well that this failed to turn up anything of note, as Director Clapper left office on January 20 and reported on March 6, 2017 that no evidence of Trump-Russia ties existed. In other words, the enhanced surveillance failed.
  • EDIT XIX: Nikulin receives his first visit from the FBI in “mid-November,” mere days before John McCain learns of Steele’s dossier.
  • EDIT VI: Thanks to the Daily Caller, we now know that John McCain learned about the dossier at the Halifax International Security Forum, which took place between November 18 and November 20, 2016. The person involved in bringing it to his attention was Sir Andrew Wood. Wood was a former ambassador for the UK to Russia, and knew Steele from his time at MI6. I have a suspicion that the exact date the discussion about the dossier happened was November 19, because Wood was involved in a panel on “Maidan, Crimea and the Obstacles to Democracy in Ukraine” on that date according to the agenda. Wood flew back to the UK, met with Steele, and handed the dossier off to McCain between November 19 (the last date I can confirm with reasonable certainty Wood was present in Halifax) and December 9, when McCain gave the dossier to James Comey during a meeting. Comey then briefed Trump on the existence of the dossier – which suggests to me that he was unaware of McCabe’s actions in trying to hire Fusion GPS – and once that meeting became known to the press, BuzzFeed published the complete dossier. EDIT XVI: Now we know that Steele’s dossier, likely the complete version handed to Comey, was used to bolster the FBI’s FISA request. Highly suspicious, and indicates the document was laundered.
  • EDIT X: Early December 2016. The Obama administration announces the beginning of an investigation into the DNC hacks, and the requests for unmasked intelligence reports relating to this begin at around this point. I think it’s likely that someone higher-up than Susan Rice ordered the unmasking, as the aforementioned paper trail through the NSA would have been immediately suspicious to the incoming Trump administration. This may also explain Rogers’ visit to Trump Tower, as unmasking in a less official manner had been going on for many months up to this point – this would merely be the latest effort to direct it at the Trump administration. I suspect the higher-up who ordered Rice to do this was most likely John Brennan; he intended Rice to be his fall guy when Trump caught up to what was going on.
  • The real unmasking begins once Obama amends EO 12333 to encourage free sharing of information between the three-letter agencies, on January 12. The new rules were signed by Clapper on December 15, so it’s reasonable to assume they had been floating around for a decently long time before that. Less than a month before Clapper agrees to them, NSA head Admiral Rogers visits Trump in an infamous “unscheduled meeting,” which draws ire from the rest of the intelligence community. It’s obvious at this point that this was in order to warn the new administration of what was going on behind closed doors, likely including the information sharing.
  • Susan Rice orders the unmasking of all Trump-related intelligence at some point after the information sharing rules go into effect. This allowed intelligence previously collected on Trump and his family to be widely disseminated between the FBI, CIA, and NSA, and thus exponentially increased the chances of leakers spreading that information to the press – which can (and did) happen. McCabe was involved in this due to his desire to force Flynn and then Trump out of office. Jeh Johnson may also have been involved in the unmasking process as well, but it’s unclear as to what his position was.
  • EDIT III: The trap from before the election was set; Flynn volunteered to be the fall guy as already a kind of black sheep in the administration (by being the sole Democrat), and he baited the intelligence community into going after him just before the new inter-agency intelligence sharing rules took effect. It worked like a charm – the media latched on to it, and Flynn handed Trump his resignation letter as the whole intelligence community fell for it hook, line, and sinker. It was now obvious who the leakers were and where they were coming from.
  • EDIT XIX: Nikulin receives his second visit from the FBI on February 7, 2017. Note that this happened after the unmasking scandal began falling apart in the waining days of the Obama administration.
  • EDIT II: Cernovich revealed tonight that H. R. McMaster was responsible for discovering Rice’s actions, and he was responsible for sending an aide to Nunes in order to blow the lid open on what was going on. This happened between February 20 (when he assumed office) and March 22 (when Nunes held his press conference). EDIT III: Flynn, it should be noted, resigned seven days before McMaster took office; I don’t think it’s a coincidence that he uncovered what Rice was doing in just over a month – Flynn’s dismissal drew all the termites out of the woodwork, and emboldened them in attempting to leak new, “damaging” information. The only effect this had was to highlight the leakers.
  • The White House figures out all of this, or some key portions of this, between January 20 and March 4. Thus follows Trump’s series of tweets discussing “wiretapping,” and the rest is history. EDIT IV: It wasn’t until early March that Rice was pinned down as the unmasker by lawyers at the White House, so I tend to think that Trump reported on “wiretapping” almost as soon as the smoking gun was found.

 
 
Source…

The CIA Implanted Microphones Into The Skin Of CATS

 Political  Comments Off on The CIA Implanted Microphones Into The Skin Of CATS
May 012017
 

The CIA tried to turn a CAT into a cyborg spy by implanting it with a microphone and antenna

The CIA Implanted Microphones Into The Skin Of CATS

The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia.

The cat had a microphone, antenna and battery pack surgically embedded into its skin so the feline could act as a covert recording device.

Recently declassified documents show how the scientists responsible for the cruel research were praised by spy chiefs for their ‘pioneering’ work.

Acoustic Kitty

The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia. Declassified documents reveal that the work was praised by CIA chiefs as a ‘remarkable scientific achievement’

The strange eavesdropping technique, though never used in the field, resurfaced this week when WikiLeaks tweeted a link to declassified CIA memos, first released in 2001.

The research was dubbed ‘Project Acoustic Kitty’ and cost $13 million (£10 million) over its five-year development in the 1960s.

The cat’s tail was used as an antenna with a wire travelling all the way up its spine to a microphone in the animal’s ear.

The equipment’s battery pack was sewn into the cat’s chest.

Victor Marchetti, a former CIA officer, told The Telegraph that year of the gruesome creation.

He said: ‘They slit the cat open, put batteries in him, wired him up’.

‘They made a monstrosity. They tested him and tested him.

‘They found he would walk off the job when he got hungry, so they put another wire in to override that,’ he added.

The final 1967 report on the project concluded it was non-practical, signalling the end of the research.

But the memo hailed the ‘remarkable scientific achievement’ reached by the American spy agency.

‘The work done on this problem over the years reflects great credit on the personnel who guided it,’ the document concluded.


The cats had microphones, antennae and battery packs surgically embedded into their skin so the felines could act as covert recording devices.

 
 
via

25 Ways To Suppress Truth: The Rules of Disinformation

 Political  Comments Off on 25 Ways To Suppress Truth: The Rules of Disinformation
Apr 262017
 

These 25 ways are everywhere in media, from political debates, to television shows, to comments on social media.

25 Ways To Suppress Truth: The Rules of Disinformation

Built upon Thirteen Techniques for Truth Suppression by David Martin, the following may be useful to the initiate in the world of dealing with veiled and half-truth, lies, and suppression of truth when serious crimes are studied in public forums. This, sadly, includes every day news media, one of the worst offenders with respect to being a source of disinformation. Where the crime involves a conspiracy, or a conspiracy to cover up the crime, there will invariably be a disinformation campaign launched against those seeking to uncover and expose the truth and/or the conspiracy. There are specific tactics which disinfo artists tend to apply, as revealed here. Also included with this material are seven common traits of the disinfo artist which may also prove useful in identifying players and motives. The more a particular party fits the traits and is guilty of following the rules, the more likely they are a professional disinfo artist with a vested motive. People can be bought, threatened, or blackmailed into providing disinformation, so even “good guys” can be suspect in many cases.

A rational person participating as one interested in the truth will evaluate that chain of evidence and conclude either that the links are solid and conclusive, that one or more links are weak and need further development before conclusion can be arrived at, or that one or more links can be broken, usually invalidating (but not necessarily so, if parallel links already exist or can be found, or if a particular link was merely supportive, but not in itself key) the argument. The game is played by raising issues which either strengthen or weaken (preferably to the point of breaking) these links. It is the job of a disinfo artist to interfere with these evaluation… to at least make people think the links are weak or broken when, in truth, they are not… or to propose alternative solutions leading away from the truth. Often, by simply impeding and slowing down the process through disinformation tactics, a level of victory is assured because apathy increases with time and rhetoric.

It would seem true in almost every instance, that if one cannot break the chain of evidence for a given solution, revelation of truth has won out. If the chain is broken either a new link must be forged, or a whole new chain developed, or the solution is invalid an a new one must be found… but truth still wins out. There is no shame in being the creator or supporter of a failed solution, chain, or link, if done with honesty in search of the truth. This is the rational approach. While it is understandable that a person can become emotionally involved with a particular side of a given issue, it is really unimportant who wins, as long as truth wins. But the disinfo artist will seek to emotionalize and chastise any failure (real or false claims thereof), and will seek by means of intimidation to prevent discussion in general.

Twenty-Five Rules of Disinformation
  1. Hear no evil, see no evil, speak no evil
  2. Become incredulous and indignant
  3. Create rumor mongers
  4. Use a straw man
  5. Sidetrack opponents w name calling, ridicule
  6. Hit and Run
  7. Question motives
  8. Invoke authority
  9. Play Dumb
  10. Associate opponent charges with old news
  11. Establish and rely upon fall-back positions
  12. Enigmas have no solution
  13. Alice in Wonderland Logic
  14. Demand complete solutions
  15. Fit the facts to alternate conclusions
  16. Vanish evidence and witnesses
  17. Change the subject
  18. Emotionalize, Antagonize, and Goad
  19. Ignore facts, demand impossible proofs
  20. False evidence
  21. Call a Grand Jury, Special Prosecutor
  22. Manufacture a new truth
  23. Create bigger distractions
  24. Silence critics
  25. Vanish
Eight Traits of The Disinformationalist
  1. Avoidance
  2. Selectivity
  3. Coincidental
  4. Teamwork
  5. Anti-conspiratorial
  6. Artificial Emotions
  7. Inconsistent
  8. Newly Discovered: Time Constant

It is the disinfo artist and those who may pull their strings (those who stand to suffer should the crime be solved) MUST seek to prevent rational and complete examination of any chain of evidence which would hang them. Since fact and truth seldom fall on their own, they must be overcome with lies and deceit. Those who are professional in the art of lies and deceit, such as the intelligence community and the professional criminal (often the same people or at least working together), tend to apply fairly well defined and observable tools in this process. However, the public at large is not well armed against such weapons, and is often easily led astray by these time-proven tactics. Remarkably, not even media and law enforcement have NOT BEEN TRAINED to deal with these issues. For the most part, only the players themselves understand the rules of the game.

This why concepts from the film, Wag-The-Dog, actually work. If you saw that movie, know that there is at least one real-world counterpart to Al Pacino’s character. For CIA, it is Mark Richards, who was called in to orchestrate the media response to Waco on behalf of Janet Reno. Mark Richards is the acknowledged High Priest of Disinformation. His appointment was extremely appropriate, since the CIA was VERY present at Waco from the very beginning of the cult to the very end of their days — just as it was at the People’s Temple in Jonestown. Richards purpose in life is damage control.

For such disinformationalists, the overall aim is to avoid discussing links in the chain of evidence which cannot be broken by truth, but at all times, to use clever deceptions or lies to make select links seem weaker than they are, create the illusion of a break, or better still, cause any who are considering the chain to be distracted in any number of ways, including the method of questioning the credentials of the presenter. Please understand that fact is fact, regardless of the source. Likewise, truth is truth, regardless of the source. This is why criminals are allowed to testify against other criminals. Where a motive to lie may truly exist, only actual evidence that the testimony itself IS a lie renders it completely invalid. Were a known ‘liar’s’ testimony to stand on its own without supporting fact, it might certainly be of questionable value, but if the testimony (argument) is based on verifiable or otherwise demonstrable facts, it matters not who does the presenting or what their motives are, or if they have lied in the past or even if motivated to lie in this instance — the facts or links would and should stand or fall on their own merit and their part in the matter will merely be supportive.

Moreover, particularly with respects to public forums such as newspaper letters to the editor, and Internet chat and news groups, the disinfo type has a very important role. In these forums, the principle topics of discussion are generally attempts by individuals to cause other persons to become interested in their own particular position, idea, or solution — very much in development at the time. People often use such mediums as a sounding board and in hopes of pollination to better form their ideas. Where such ideas are critical of government or powerful, vested groups (especially if their criminality is the topic), the disinfo artist has yet another role — the role of nipping it in the bud. They also seek to stage the concept, the presenter, and any supporters as less than credible should any possible future confrontation in more public forums result due to their early successes. You can often spot the disinfo types at work here by the unique application of “higher standards” of discussion than necessarily warranted. They will demand that those presenting arguments or concepts back everything up with the same level of expertise as a professor, researcher, or investigative writer. Anything less renders any discussion meaningless and unworthy in their opinion, and anyone who disagrees is obviously stupid — and they generally put it in exactly those terms.

So, as you read any such discussions, particularly so in Internet news groups (NG), decide for yourself when a rational argument is being applied and when disinformation, psyops (psychological warfare operations) or trickery is the tool. Accuse those guilty of the later freely. They (both those deliberately seeking to lead you astray, and those who are simply foolish or misguided thinkers) generally run for cover when thus illuminated, or — put in other terms, they put up or shut up (a perfectly acceptable outcome either way, since truth is the goal.) Here are the twenty-five methods and seven traits, some of which don’t apply directly to NG application. Each contains a simple example in the form of actual (some paraphrased for simplicity) from NG comments on commonly known historical events, and a proper response. Accusations should not be overused — reserve for repeat offenders and those who use multiple tactics. Responses should avoid falling into emotional traps or informational sidetracks, unless it is feared that some observers will be easily dissuaded by the trickery. Consider quoting the complete rule rather than simply citing it, as others will not have reference. Offer to provide a complete copy of the rule set upon request (see permissions statement at end):

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

(1) Hear No Evil, See No Evil, Speak No Evil

Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

Example: Media was present in the courtroom (Hunt vs. Liberty Lobby) when CIA agent Marita Lorenz ‘confession’ testimony regarding CIA direct participation in the planning and assassination of John Kennedy was revealed. All media reported was that E. Howard Hunt lost his libel case against Liberty Lobby (Liberty Lobby’s newspaper, The Spotlight, had reported Hunt was in Dallas that day and were sued for the story). See Mark Lane’s remarkable book, Plausible Denial, for the full confessional transcript.

Proper response: There is no possible response unless you are aware of the material and can make it public yourself.. In any such attempt, be certain to target any known silent party as likely complicit in a cover up. In this case, it would be the entire Time-Warner Media Group, among others. This author is relatively certain that reporters were hand-picked to cover this case from among those having intelligence community ties.

(2) Become Incredulous and Indignant

Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

Example: ‘How dare you suggest that the Branch Davidians were murdered! the FBI and BATF are made up of America’s finest and best trained law enforcement, operate under the strictest of legal requirements, and are under the finest leadership the President could want to appoint.’

Proper response: You are avoiding the Waco issue with disinformation tactics. Your high opinion of FBI is not founded in fact. All you need do is examine Ruby Ridge and any number of other examples, and you will see a pattern of abuse of power that demands attention to charges against FBI/BATF at Waco. Why do you refuse to address the issues with disinformation tactics (rule 2 – become incredulous and indignant)?

(3) Create Rumor Mongers

Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

‘You can’t prove his material was legitimately from French Intelligence. Pierre Salinger had a chance to show his ‘proof’ that flight 800 was brought down by friendly fire, and he didn’t. All he really had was the same old baseless rumor that’s been floating around the Internet for months.’

Proper response: You are avoiding the issue with disinformation tactics. The Internet charge reported widely is based on a single FBI interview statement to media and a similar statement by a Congressman, neither of which had actually seen Pierre’s document. As the FBI is being accused in participating in a cover up of this matter and Pierre claims his material is not Internet sourced, it is natural that FBI would have reason to paint his material in a negative light. For you to assume the FBI to have no bias in the face of Salinger’s credentials and unchanged stance suggests you are biased. At the best you can say the matter is in question. Further, to imply that material found on Internet is worthless is not founded. At best you may say it must be considered carefully before accepting it, which will require addressing the actual issues. Why do you refuse to address these issues with disinformation tactics (rule 3 – create rumor mongers)?

(4) Use a Straw Man

Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

Example: When trying to defeat reports by the Times of London that spy-sat images reveal an object racing towards and striking flight 800, a straw man is used. The disinformationalist, later identified as having worked for Naval Intelligence, simply stated: ‘If these images exist, the public has not seen them. Why? They don’t exist, and never did. You have no evidence and thus, your entire case falls flat.’

Proper response: ‘You are avoiding the issue with disinformation tactics. You imply deceit and deliberately establish an impossible and unwarranted test. It is perfectly natural that the public has not seen them, nor will they for some considerable time, if ever. To produce them would violate national security with respect to intelligence gathering capabilities and limitations, and you should know this. Why do you refuse to address the issues with such disinformation tactics (rule 4 – use a straw man)?’

(5) Sidetrack Opponents with Name-Calling and Ridicule

This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

Example: ‘You believe what you read in the Spotlight? The Publisher, Willis DeCarto, is a well-known right-wing racist. I guess we know your politics — does your Bible have a swastika on it? That certainly explains why you support this wild-eyed, right-wing conspiracy theory.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply guilt by association and attack truth on the basis of the messenger. The Spotlight is well known Populist media source responsible for releasing facts and stories well before mainstream media will discuss the issues through their veil of silence. Willis DeCarto has successfully handled lawsuits regarding slanderous statements such as yours. Your undemonstrated charges against the messenger have nothing to do with the facts or the issues, and fly in the face of reason. Why do you refuse to address the issues by use of such disinformation tactics (rule 5 – sidetrack opponents with name calling and ridicule)?’

(6) Hit and Run

In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

Example: ”This stuff is garbage. Where do you conspiracy lunatics come up with this crap? I hope you all get run over by black helicopters.’ Notice it even has a farewell sound to it, so it won’t seem curious if the author is never heard from again.

Proper response: ‘You are avoiding the issue with disinformation tactics. Your comments or opinions fail to offer any meaningful dialog or information, and are worthless except to pander to emotionalism, and in fact, reveal you to be emotionally insecure with these matters. If you do not like reading ‘this crap’, why do you frequent this NG which is clearly for the purpose of such discussion? Why do you refuse to address the issues by use of such disinformation tactics (rule 6 – hit and run)?’

(7) Question Motives

Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

Example: ‘With the talk-show circuit and the book deal, it looks like you can make a pretty good living spreading lies.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply guilt as a means of attacking the messenger or his credentials, but cowardly fail to offer any concrete evidence that this is so. If you think what has been presented are ‘lies’, why not simply so illustrate? Why do you refuse to address the issues by use of such disinformation tactics (rule 6 – question motives)?’

(8) Invoke Authority

Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

‘You obviously know nothing about either the politics or strategic considerations, much less the technicals of the SR-71. Incidentally, for those who might care, that sleek plane is started with a pair of souped up big-block V-8’s (originally, Buick 454 C.I.D. with dual 450 CFM Holly Carbs and a full-race Isky cams — for 850 combined BHP @ 6,500 RPM) using a dragster-style clutch with direct-drive shaft. Anyway, I can tell you with confidence that no Blackbird has ever been flown by Korean nationals nor have they ever been trained to fly it, and have certainly never overflown the Republic of China in a SR or even launched a drone from it that flew over China. I’m not authorized to discuss if there have been overflights by American pilots.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply your own authority and expertise but fail to provide credentials, and you also fail to address issues and cite sources. You simply cite ‘Jane’s-like’ information to make us think you know what you are talking about. Why do you refuse to address the issues by use of such disinformation tactics (rule 8 – invoke authority)?’

(9) Play Dumb

No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

Example: ‘Nothing you say makes any sense. Your logic is idiotic. Your facts nonexistent. Better go back to the drawing board and try again.’

Proper response: ‘You are avoiding the issue with disinformation tactics. You evade the issues with your own form of nonsense while others, perhaps more intelligent than you pretend to be, have no trouble with the material. Why do you refuse to address the issues by use of such disinformation tactics (Rule 9 – play dumb)?’

(10) Associate Opponent Charges with Old News

A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

Example: ‘Flight 553’s crash was pilot error, according to the NTSB findings. Digging up new witnesses who say the CIA brought it down at a selected spot and were waiting for it with 50 agents won’t revive that old dead horse buried by NTSB more than twenty years ago.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your ignore the issues and imply they are old charges as if new information is irrelevant to truth. Why do you refuse to address the issues by use of such disinformation tactics (rule 10 – associate charges with old news)?’

(11) Establish and Rely Upon Fall-Back Positions

Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

Example: ‘Reno admitted in hindsight she should have taken more time to question the data provided by subordinates on the deadliness of CS-4 and the likely Davidian response to its use, but she was so concerned about the children that she elected, in what she now believes was a sad and terrible mistake, to order the tear gas be used.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your evade the true issue by focusing on a side issue in an attempt to evoke sympathy. Perhaps you did not know that CIA Public Relations expert Mark Richards was called in to help Janet Reno with the Waco aftermath response? How warm and fuzzy it makes us feel, so much so that we are to ignore more important matters being discussed. Why do you refuse to address the issues by use of such disinformation tactics (rule 11 – establish and rely upon fall-back positions)?’

(12) Enigmas Have No Solution

Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.

Example: ‘I don’t see how you can claim Vince Foster was murdered since you can’t prove a motive. Before you could do that, you would have to completely solve the whole controversy over everything that went on in the White House and in Arkansas, and even then, you would have to know a heck of a lot more about what went on within the NSA, the Travel Office, and the secret Grand Jury, and on, and on, and on. It’s hopeless. Give it up.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your completely evade issues and attempt others from daring to attempt it by making it a much bigger mountain than necessary. You eat an elephant one bite at a time. Why do you refuse to address the issues by use of such disinformation tactics (rule 12 – enigmas have no solution)?’

(13) Alice in Wonderland Logic 

Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

Example: ‘The news media operates in a fiercely competitive market where stories are gold. This means they dig, dig, dig for the story — often doing a better job than law enforcement. If there was any evidence that BATF had prior knowledge of the Oklahoma City bombing, they would surely have uncovered it and reported it. They haven’t reported it, so there can’t have been any prior knowledge. Put up or shut up.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your backwards logic does not work here. Has media reported CIA killed Kennedy when they knew it? No, despite their presence at a courtroom testimony ‘confession’ by CIA operative Marita Lornez in a liable trial between E. Howard Hunt and Liberty Lobby, they only told us the trial verdict. THAT, would have been the biggest story of the Century, but they didn’t print it, did they? Why do you refuse to address the issues by use of such disinformation tactics (rule 13 – Alice in Wonderland logic)?’

(14) Demand Complete Solutions 

Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

Example: ‘Since you know so much, if James Earl Ray is as innocent as you claim, who really killed Martin Luther King, how was it planned and executed, how did they frame Ray and fool the FBI, and why?’

Proper response: You are avoiding the issue with disinformation tactics. It is not necessary to completely resolve any full matter in order to examine any relative attached issue. Discussion of any evidence of Ray’s innocence can stand alone to serve truth, and any alternative solution to the crime, while it may bolster that truth, can also stand alone. Why do you refuse to address the issues by use of such disinformation tactics (rule 14 – demand complete solutions)?

(15) Fit the Facts to Alternate Conclusions

This requires creative thinking unless the crime was planned with contingency conclusions in place.

Example: ‘The cargo door failed on Flight 800 and caused a catastrophic breakup which ruptured the fuel tank and caused it to explode.’

Proper response: The best definitive example of avoiding issues by this technique is, perhaps, Arlan Specter’s Magic Bullet from the Warren Report. This was eloquently defeated in court but media blindly accepted it without challenge. Thus rewarded, disinformationalists do not shrink from its application, even though today, thanks in part to the movie, JFK, most Americans do now understand it was fabricated nonsense. Thus the defense which works best may actually be to cite the Magic Bullet. ‘You are avoiding the issue with disinformation tactics. Your imaginative twisting of facts rivals that of Arlan Specter’s Magic Bullet in the Warren Report. We all know why the impossible magic bullet was invented. You invent a cargo door problem when there has been not one shred of evidence from the crash investigation to support it, and in fact, actual photos of the cargo door hinges and locks disprove you. Why do you refuse to address the issues by use of such disinformation tactics (rule 15 – fit facts to an alternate conclusion)?’

(16) Vanish Evidence and Witnesses

If it does not exist, it is not fact, and you won’t have to address the issue.

Example: ‘You can’t say Paisley is still alive… that his death was faked and the list of CIA agents found on his boat deliberately placed there to support a purge at CIA. You have no proof. Why can’t you accept the Police reports?’ This is a good ploy, since the dental records and autopsy report showing his body was two inches too long and the teeth weren’t his were lost right after his wife demanded inquiry, and since his body was cremated before she could view it — all that remains are the Police Reports. Handy.

Proper response: There is no suitable response to actual vanished materials or persons, unless you can shed light on the matter, particularly if you can tie the event to a cover up other criminality. However, with respect to dialog where it is used against the discussion, you can respond… ‘You are avoiding the issue with disinformation tactics. The best you can say is that the matter is in contention ONLY because of highly suspicious matters such as the simultaneous and mysterious vanishing of three sets of evidence. The suspicious nature itself tends to support the primary allegation. Why do you refuse to address the remaining issues by use of such disinformation tactics (rule 16 – vanish evidence and witnesses)?’

(17) Change the Subject

Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

Example: ‘There were no CIA drugs and was no drug money laundering through Mena, Arkansas, and certainly, there was no Bill Clinton knowledge of it because it simply didn’t happen. This is merely an attempt by his opponents to put Clinton off balance and at a disadvantage in the election: Dole is such a weak candidate with nothing to offer that they are desperate to come up with something to swing the polls. Dole simply has no real platform.’ Assistant’s response. ‘You idiot! Dole has the clearest vision of what’s wrong with Government since McGovern. Clinton is only interested in raping the economy, the environment, and every woman he can get his hands on…’ One naturally feels compelled, regardless of party of choice, to jump in defensively on that one…

Proper response: ‘You are both avoiding the issue with disinformation tactics. Your evade discussion of the issues by attempting to sidetrack us with an emotional response to a new topic — a trap which we will not fall into willingly. If you truly believe such political rhetoric, please drop out of this discussion, as it is not germane, and take it to one of the more appropriate politics NGs. Why do you refuse to address the issues by use of such disinformation tactics (rule 17- change the subject)?’

(18) Emotionalize, Antagonize, and Goad Opponents

If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

Example: ‘You are such an idiot to think that possible — or are you such a paranoid conspiracy buff that you think the ‘gubment’ is cooking your pea-brained skull with microwaves, which is the only justification you might have for dreaming up this drivel.’ After a drawing an emotional response: ‘Ohhh… I do seem to have touched a sensitive nerve. Tsk, tsk. What’s the matter? The truth too hot for you to handle? Perhaps you should stop relying on the Psychic Friends Network and see a psychiatrist for some real professional help…’

Proper response: ‘You are avoiding the issue with disinformation tactics. You attempt to draw me into emotional response without discussion of the issues. If you have something useful to contribute which defeats my argument, let’s here it — preferably without snide and unwarranted personal attacks, if you can manage to avoid sinking so low. Your useless rhetoric serves no purpose here if that is all you can manage. Why do you refuse to address the issues by use of such disinformation tactics (rule 18 – emotionalize, antagonize, and goad opponents)?’

(19) Ignore Proof Presented, Demand Impossible Proofs

This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

Example: ‘All he’s done is to quote the liberal media and a bunch of witnesses who aren’t qualified. Where’s his proof? Show me wreckage from flight 800 that shows a missile hit it!’

Proper response: ‘You are avoiding the issue with disinformation tactics. You presume for us not to accept Don Phillips, reporter for the Washington Post, Al Baker, Craig Gordon or Liam Pleven, reporters for Newsday, Matthew Purdy or Matthew L. Wald, Don Van Natta Jr., reporters for the New York Times, or Pat Milton, wire reporter for the Associated Press — as being able to tell us anything useful about the facts in this matter. Neither would you allow us to accept Robert E. Francis, Vice Chairman of the NTSB, Joseph Cantamessa Jr., Special Agent In Charge of the New York Office of the F.B.I., Dr. Charles Wetli, Suffolk County Medical Examiner, the Pathologist examining the bodies, nor unnamed Navy divers, crash investigators, or other cited officials, including Boeing Aircraft representatives a part of the crash investigative team — as a qualified party in this matter, and thus, dismisses this material out of hand. Good logic, — about as good as saying 150 eye witnesses aren’t qualified. Then you demand us to produce evidence which you know is not accessible to us, evidence held by FBI, whom we accuse of cover up. Thus, only YOU are qualified to tell us what to believe? Witnesses be damned? Radar tracks be damned? Satellite tracks be damned? Reporters be damned? Photographs be damned? Government statements be damned? Is there a pattern here?. Why do you refuse to address the issues by use of such disinformation tactics (rule 19 – ignore proof presented, demand impossible proofs)?’

(20) False Evidence

Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

Example: Jack Ruby warned the Warren Commission that the white Russian separatists, the Solidarists, were involved in the assassination. This was a handy ‘confession’, since Jack and Earl were both on the same team in terms of the cover up, and since it is now known that Jack worked directly with CIA in the assassination (see below.)

Proper response: This one can be difficult to respond to unless you see it clearly, such as in the following example, where more is known today than earlier in time… ‘You are avoiding the issue with disinformation tactics. Your information is known to have been designed to side track this issue. As revealed by CIA operative Marita Lorenz under oath offered in court in E. Howard Hunt vs. Liberty Lobby, CIA operatives E. Howard Hunt, James McCord, and others, met with Jack Ruby in Dallas the night before the assassination of JFK to distribute guns and money. Clearly, Ruby was a coconspirator whose ‘Solidarist confession’ was meant to sidetrack any serious investigation of the murder AWAY from CIA. Why do you refuse to address the issues by use of such disinformation tactics (rule 20 – false evidence)?’

(21) Call a Grand Jury, Special Prosecutor, or Other Empowered Investigative Body

Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

Example: According to one OK bombing Federal Grand Juror who violated the law to speak the truth, jurors were, contrary to law, denied the power of subpoena of witness of their choosing, denied the power of asking witnesses questions of their choosing, and relegated to hearing only evidence prosecution wished them to hear, evidence which clearly seemed fraudulent and intended to paint conclusions other than facts actually suggested.

Proper response: There is usually no adequate response to this tactic except to complain loudly at any sign of its application, particularly with respect to any possible cover up. This happened locally in Oklahoma, and as a result, a new Grand Jury has been called to rehear evidence that government officials knew in advance that the bombing was going to take place, and a number of new facts which indicate it was impossible for Timothy McVeigh to have done the deed without access to extremely advanced explosive devices such as available ONLY to the military or intelligence community, such as CIA’s METC technology. Media has refused to cover the new Oklahoma Grand Jury process, by they way.

(22) Manufacture a New Truth

Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

Example: The False Memory Syndrome Foundation and American Family Foundation and American and Canadian Psychiatric Associations fall into this category, as their founding members and/or leadership include key persons associated with CIA Mind Control research. Read The Professional Paranoid or Phsychic Dictatorship in the U.S.A. by Alex Constantine for more information. Not so curious, then, that (in a perhaps oversimplified explanation here) these organizations focus on, by means of their own “research findings”, that there is no such thing as Mind Control.

Proper response: Unless you are in a position to be well versed in the topic and know of the background and relationships involved in the opponent organization, you are not well equipped to fight this tactic.

(23) Create Bigger Distractions

If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

Example: To distract the public over the progress of a WTC bombing trial that seems to be uncovering nasty ties to the intelligence community, have an endless discussion of skaters whacking other skaters on the knee. To distract the public over the progress of the Waco trials that have the potential to reveal government sponsored murder, have an O.J. summer. To distract the public over an ever disintegrating McVeigh trial situation and the danger of exposing government involvements, come up with something else (Flight 800?) to talk about — or, keeping in the sports theme, how about sports fans shooting referees and players during a game and the focusing on the whole gun control thing?

Proper response: The best you can do is attempt to keep public debate and interest in the true issues alive and point out that the ‘news flap’ or other evasive tactic serves the interests of your opponents.

(24) Silence Critics

If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

Example: As experienced by certain proponents of friendly fire theories with respect to flight 800 — send in FBI agents to intimidate and threaten that if they persisted further they would be subject to charges of aiding and abetting Iranian terrorists, of failing to register as a foreign agents, or any other trumped up charges. If this doesn’t work, you can always plant drugs and bust them.

Proper response: You have three defensive alternatives if you think yourself potential victim of this ploy. One is to stand and fight regardless. Another is to create for yourself an insurance policy which will point to your opponents in the event of any unpleasantness, a matter which requires superior intelligence information on your opponents and great care in execution to avoid dangerous pitfalls (see The Professional Paranoid by this author for suggestions on how this might be done). The last alternative is to cave in or run (same thing.)

(25) Vanish

If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Example: Do a Robert Vesco and retire to the Caribbean. If you don’t, somebody in your organization may choose to vanish you the way of Vince Foster or Ron Brown.

Proper response: You will likely not have a means to attack this method, except to focus on the vanishing in hopes of uncovering it was by foul play or deceit as part of a deliberate cover up.

 

 
via

Declassified CIA Document Reveals Plan To Destroy Syria For Oil Pipeline

 Political  Comments Off on Declassified CIA Document Reveals Plan To Destroy Syria For Oil Pipeline
Apr 122017
 

A CIA document from the early 1980s details a US plan to destroy Syria — in much the same way the United States has been doing for the last few years.

Declassified CIA Document Reveals Plan To Destroy Syria For Oil Pipeline

Geostrategically crucial Syria has been at the center of a decades-long plot by the United States to depose the sovereign government and install one supportive of goals in the Middle East must be revisited — and quickly — before the beating of war drums drowns out the truth of our government’s recently-espoused mission.

President Donald Trump has repeatedly castigated President Bashar al-Assad for ordering a gruesome mass killing of civilians with chemical weapons in Khan Sheikhoun. This accusation sparked a bolstering of support for the Syrian regime from both Moscow and Tehran.

“Syria at present has a hammerlock on US interests both in Lebanon and in the Gulf — through closure of Iraq’s pipeline thereby threatening Iraqi internationalization of the war. The US should consider sharply escalating the pressures against Assad through covertly orchestrating simultaneous military threats against Syria from three border states hostile to Syria: Iraq, Israel and Turkey.”

While the preceding bears the names of leaders and nations familiar to current headlines, that assessment, cogently titled, “Bringing Real Muscle to Bear Against Syria,” from former CIA officer Graham Fuller in actuality discusses Syria under Assad’s predecessor — his father, Hafez al-Assad — and is dated September 14, 1983, amid the Iran-Iraq War.

CIA-RDP88B00443R001404090133-0

 
Fuller’s analysis, points out Activist Post’s Brandon Turbeville, evinces Assad as a nuisance hindering American empire’s lust to control vast fossil fuel stores and protect ally, Israel, against multiple threats in the Middle East. Destabilization of Iraq and Iran also features prominently in the intricate U.S. plan to deal with the irritant, elder Assad — who, incidentally, recognized Western ulterior motives for what they were.

As the six-page document continues,

Syria continues to maintain a hammerlock on two key U.S. interests in the Middle East:

— Syrian refusal to withdraw its troops from Lebanon ensures Israeli occupation in the south;

— Syrian closure of the Iraqi pipeline has been a key factor in bringing Iraq to its financial knees, impelling it towards dangerous internationalization of the war in the Gulf.

Diplomatic initiatives to date have had little effect on Assad who has so far correctly calculated the play of forces in the area and concluded that they are only weakly arrayed against him. If the U.S. is to rein in Syria’s spoiling role, it can only do so through the exertion of real muscle which will pose a vital threat to Assad’s position and power.

CIA Document screen shot

With Iraq seeking to enjoin support internationally in the war, the U.S. had to scramble to prevent the shutdown of a pipeline — a dilemma Fuller suggests could be alleviated through a change in narrative to present Syria as a more deviant enemy than even Iran. That, alone, would have changed the face of the war bearing the names of the two principal adversaries — Sunni majority, Iraq, and Syria-allied, Shi’a, Iran.

Fuller asserted,

“The US should consider urging Iraq to take the war to the other key source of its predicament: Syria.”

Further, he continued,

“The US should consider sharply escalating the pressures against Assad [Sr.] through covertly orchestrating simultaneous military threats against Syria from three border states hostile to Syria: Iraq, Israel and Turkey. Iraq, perceived to be increasingly desperate in the Gulf war, would undertake limited military (air) operations against Syria with the sole goal of opening the pipeline. Although opening war on a second front against Syria poses considerable risk to Iraq, Syria would also face a two-front war since it is already heavily engaged in the Bekaa, on the Golan and in maintaining control over a hostile and restive population inside Syria.

“Israel would simultaneously raise tensions along Syria’s Lebanon front without actually going to war. Turkey, angered by Syrian support to Armenian terrorism, to Iraqi Kurds on Turkey’s Kurdish border areas and to Turkish terrorists operating out of northern Syria, has often considered launching unilateral military operations against terrorist camps in northern Syria. Virtually all Arab states would have sympathy for Iraq.

“Faced with three belligerent fronts, Assad would probably be forced to abandon his policy of closure of the pipeline. Such a concession would relieve the economic pressure on Iraq, and perhaps force Iran to reconsider bringing the war to an end. It would be a sharpening blow to Syria’s prestige and could effect the equation of forces in Lebanon.”

In context, then-President Ronald Reagan faced pressure both to insert military power in Lebanon — a theater of stated neutrality for the U.S. — and to prohibit actual military assistance in the fraught regional entanglement.

That is, until a suicide bomber decimated a U.S. Marines barracks encamped at an airport in Beirut, killing hundreds — just one month subsequent to the date on Fuller’s Syria action plan.

Micah Zenko, Senior Fellow at the Council on Foreign Relations — an albeit establishment- and Deep State-connected think tank — in “When America Attacked Syria,” wrote in 2012:

“The October 23, 1983, suicide truck bombing of the Marine barracks at the Beirut International Airport would kill 241 U.S. military personnel; simultaneously, another suicide bomber killed fifty-eight French servicemen of the MNF several kilometers away. (Two weeks later, yet another truck bomb exploded in the Israeli military headquarters in Tyre, killing sixty.) A FBI forensics assessment called the Marine barracks bombing the ‘biggest non-nuclear explosion since World War II.’ According to a Pentagon commission formed to investigate the attack, it was ‘tantamount to an act of war using the medium of terrorism.’ Within weeks, the CIA determined that ‘the bombings…of the United States and French MNF headquarters were carried out by Shia radicals, armed, trained, and directed by Syria and Iran.’”

That the CIA — master meddler in the affairs of sovereign nations — determined fault for the bombings rested with Syria and Iran left both plausibly responsible, with public perception largely following suit.

That a situation eerily similar — in behind-the-scenes string-pulling and long-term U.S. commitment to deposing an Assad from rule in Syria — appears to be playing out nearly three-and-a-half decades later, bellows resoundingly on failures of interventionist foreign policy.

Or, perhaps, its successes.

“Such a threat must be primarily military in nature. At present there are three relatively hostile elements around Syria’s borders: Israel, Iraq and Turkey. Consideration must be given to orchestrating a credible military threat against Syria in order to induce at least some moderate change in its policies,” Fuller explained in the document.

“This paper proposes serious examination of the use of all three states – acting independently – to exert the necessary threat. Use of any one state in isolation cannot create such a credible threat.”

Syria is now a landmine for the Trump administration — as it has been in varying intensity for a lengthy succession of presidents before.

 

 

 
via

The Order Of Skull And Bones

 Political  Comments Off on The Order Of Skull And Bones
Apr 122017
 

Everything You Ever Wanted to Know About The Order Of Skull And Bones, But Were Afraid to Ask

The Order Of Skull And Bones

The story begins at Yale, where three threads of American social history — espionage, drug smuggling and secret societies — intertwine into one. ParaScope is pleased to present this treatise on the Order of Skull and Bones, whose initiates fill the ranks of the global elite. Is Skull and Bones the American branch of the Illuminati? Are national and global events manipulated as part of a grand Hegellian equation, thesis and anti-thesis yielding a New World Order synthesis? The evidence and events surrounding the Order of Skull and Bones will shock you. Read on.

1. The Secret Origins of Skull & Bones

 
The Secret Origins of Skull & BonesThe story begins at Yale, where three threads of American social history — espionage, drug smuggling and secret societies — intertwine into one.

Elihu Yale was born near Boston, educated in London, and served with the British East India Company, eventually becoming governor of Fort Saint George, Madras, in 1687. He amassed a great fortune from trade and returned to England in 1699. Yale became known as quite a philanthropist; upon receiving a request from the Collegiate School in Connecticut, he sent a donation and a gift of books. After subsequent bequests, Cotton Mather suggested the school be named Yale College, in 1718.

A statue of Nathan Hale stands on Old Campus at Yale University. There is a copy of that statue in front of the CIA’s headquarters in Langley, Virginia. Yet another stands in front of Phillips Academy in Andover, Massachusetts (where George H.W. Bush (’48) went to prep school and joined a secret society at age twelve).

Nathan Hale, along with three other Yale graduates, was a member of the “Culper Ring,” one of America’s first intelligence operations. Established by George Washington, it was successful throughout the Revolutionary War. Nathan was the only operative to be ferreted out by the British, and after speaking his famous regrets, he was hanged in 1776. Ever since the founding of the Republic, the relationship between Yale and the “Intelligence Community” has been unique.

In 1823, Samuel Russell established Russell and Company for the purpose of acquiring opium in Turkey and smuggling it to China. Russell and Company merged with the Perkins (Boston) syndicate in 1830 and became the primary American opium smuggler. Many of the great American and European fortunes were built on the “China”(opium) trade.

One of Russell and Company’s Chief of Operations in Canton was Warren Delano, Jr., grandfather of Franklin Roosevelt. Other Russell partners included John Cleve Green (who financed Princeton), Abiel Low (who financed construction of Columbia), Joseph Coolidge and the Perkins, Sturgis and Forbes families. (Coolidge’s son organized the United Fruit company, and his grandson, Archibald C. Coolidge, was a co-founder of the Council on Foreign Relations.)

William Huntington Russell (’33), Samuel’s cousin, studied in Germany from 1831-32. Germany was a hotbed of new ideas. The “scientific method” was being applied to all forms of human endeavor. Prussia, which blamed the defeat of its forces by Napoleon in 1806 on soldiers only thinking about themselves in the stress of battle, took the principles set forth by John Locke and Jean Rosseau and created a new educational system. Johan Fitche, in his “Address to the German People,” declared that the children would be taken over by the State and told what to think and how to think it.

Georg Wilhelm Friedrich Hegel took over Fitche’s chair at the University Of Berlin in 1817, and was a professor there until his death in 1831. Hegel was the culmination of the German idealistic philosophy school of Immanuel Kant.

To Hegel, our world is a world of reason. The state is Absolute Reason and the citizen can only become free by worship and obedience to the state. Hegel called the state the “march of God in the world” and the “final end”. This final end, Hegel said, “has supreme right against the individual, whose supreme duty is to be a member of the state.” Both fascism and communism have their philosophical roots in Hegellianism. Hegellian philosophy was very much in vogue during William Russell’s time in Germany.

When Russell returned to Yale in 1832, he formed a senior society with Alphonso Taft (’33). According to information acquired from a break-in to the “tomb” (the Skull and Bones meeting hall) in 1876, “Bones is a chapter of a corps in a German University…. General Russell, its founder, was in Germany before his Senior Year and formed a warm friendship with a leading member of a German society. He brought back with him to college, authority to found a chapter here.” So class valedictorian William H. Russell, along with fourteen others, became the founding members of “The Order of Scull and Bones,” later changed to “The Order of Skull and Bones”.

The secretive Order of Skull and Bones exists only at Yale. Fifteen juniors are “tapped” each year by the seniors to be initiated into next year’s group. Some say each initiate is given $15,000 and a grandfather clock. Far from being a campus fun-house, the group is geared more toward the success of its members in the post-collegiate world.

The family names on the Skull and Bones roster roll off the tongue like an elite party list — Lord, Whitney, Taft, Jay, Bundy, Harriman, Weyerhaeuser, Pinchot, Rockefeller, Goodyear, Sloane, Stimson, Phelps, Perkins, Pillsbury, Kellogg, Vanderbilt, Bush, Lovett and so on.

William Russell went on to become a general and a state legislator in Connecticut. Alphonso Taft was appointed U.S. Attorney General, Secretary of War (a post many “Bonesmen” have held), Ambassador to Austria, and Ambassador to Russia (another post held by many “Bonesmen”). His son, William Howard Taft (’87), is the only man to be both President of the United States and Chief Justice of the Supreme Court.

2. Secrets of the “Tomb”

 
The Secret Origins of Skull & BonesThe Order flourished from the very beginning in spite of occasional squalls of controversy. There was dissension from some professors, who didn’t like its secrecy and exclusiveness. And there was backlash from students, showing concern about the influence “Bones” was having over Yale finances and the favoritism shown to “Bonesmen.”

In October of 1873, Volume 1, Number 1, of The Iconoclast was published in New Haven. It was only published once and was one of very few openly published articles on the Order of Skull and Bones.

From The Iconoclast:

“We speak through a new publication. because the college press is closed to those who dare to openly mention ‘Bones’….

“Out of every class Skull and Bones takes its men. They have gone out into the world and have become, in many instances, leaders in society. They have obtained control of Yale. Its business is performed by them. Money paid to the college must pass into their hands, and be subject to their will. No doubt they are worthy men in themselves, but the many, whom they looked down upon while in college, cannot so far forget as to give money freely into their hands. Men in Wall Street complain that the college comes straight to them for help, instead of asking each graduate for his share. The reason is found in a remark made by one of Yale’s and America’s first men: ‘Few will give but Bones men and they care far more for their society than they do for the college….’

“Year by year the deadly evil is growing. The society was never as obnoxious to the college as it is today, and it is just this ill-feeling that shuts the pockets of non-members. Never before has it shown such arrogance and self-fancied superiority. It grasps the College Press and endeavors to rule it all. It does not deign to show its credentials, but clutches at power with the silence of conscious guilt.

“To tell the good which Yale College has done would be well nigh impossible. To tell the good she might do would be yet more difficult. The question, then, is reduced to this — on the one hand lies a source of incalculable good — on the other a society guilty of serious and far-reaching crimes. It is Yale College against Skull and Bones!! We ask all men, as a question of right, which should be allowed to live?”

At first, the society held its meetings in hired halls. Then in 1856, the “tomb”, a vine-covered, windowless, brown-stone hall was constructed, where to this day the “Bonesmen” hold their “strange, occultish” initiation rites and meet each Thursday and Sunday.

On September 29, 1876, a group calling itself “The Order of File and Claw” broke into the Skull and Bones’ holy of holies. In the “tomb” they found lodge-room 324 “fitted up in black velvet, even the walls being covered with the material.” Upstairs was lodge-room 322, “the ‘sanctum sanctorium’ of the temple… furnished in red velvet” with a pentagram on the wall. In the hall are “pictures of the founders of Bones at Yale, and of members of the Society in Germany, when the chapter was established here in 1832.” The raiding party found another interesting scene in the parlor next to room 322.

From “The Fall Of Skull And Bones”:

“On the west wall, hung among other pictures, an old engraving representing an open burial vault, in which, on a stone slab, rest four human skulls, grouped about a fools cap and bells, an open book, several mathematical instruments, a beggar’s scrip, and a royal crown. On the arched wall above the vault are the explanatory words, in Roman letters, ‘We War Der Thor, Wer Weiser, Wer Bettler Oder, Kaiser?’ and below the vault is engraved, in German characters, the sentence; ‘Ob Arm, Ob Beich, im Tode gleich.’

The picture is accompanied by a card on which is written, ‘From the German Chapter. Presented by D. C. Gilman of D. 50’.”

Daniel Coit Gilman (’52), along with two other “Bonesmen,” formed a troika which still influences American life today. Soon after their initiation in Skull and Bones, Daniel Gilman, Timothy Dwight (’49) and Andrew Dickinson White (’53) went to study philosophy in Europe at the University of Berlin. Gilman returned from Europe and incorporated Skull and Bones as Russell Trust, in 1856, with himself as Treasurer and William H. Russell as President. He spent the next fourteen years in New Haven consolidating the order’s power.

Gilman was appointed Librarian at Yale in 1858. Through shrewd political maneuvering, he acquired funding for Yale’s science departments (Sheffield Scientific School) and was able to get the Morrill Land Bill introduced in Congress, passed and finally signed by President Lincoln, after being vetoed by President Buchanan.

This bill, “donating public-lands for State College for agriculture and sciences”, is now known as the Land Grant College Act. Yale was the first school in America to get the federal land scrip and quickly grabbed all of Connecticut’s share at the time. Pleased by the acquisitions, Yale made Gilman a Professor of Physical Geography.

Daniel was the first President of the University of California. He also helped found, and was the first president of, John Hopkins.

Gilman was first president of the Carnegie Institution and involved in the founding of the Peabody, Slater and Russell Sage Foundations.

His buddy, Andrew D. White, was the first president of Cornell University (which received all of New York’s share of the Land Grant College Act), U.S. Minister to Russia, U.S. Ambassador to Berlin and first president of the American Historical Association. White was also Chairman of the American delegation to the first Hague Conference in 1899, which established an international judiciary.

Timothy Dwight, a professor at Yale Divinity School, was installed as president of Yale in 1886. All presidents since, have been either “Bonesmen” or directly tied to the Order and its interests.

The Daniel/Gilman/White trio was also responsible for the founding of the American Economic Association, the American Chemical Society and the American Psychological Association. Through their influences on John Dewey and Horace Mann, this trio continues to have an enormous impact on education today.

3. Networks of Power

 
The Secret Origins of Skull & BonesIn his book “America’s Secret Establishment,” Antony Sutton outlined the Order of Skull and Bones’ ability to establish vertical and horizontal “chains of influence” that ensured the continuity of their conspiratorial schemes.

The Whitney-Stimson-Bundy links represent the “vertical chain”.

W. C. Whitney (’63), who married Flora Payne (of the Standard Oil Payne dynasty), was Secretary of the Navy. His attorney was a man named Elihu Root. Root hired Henry Stimson (’88), out of law school. Stimson took over from Root as Secretary of War in 1911, appointed by fellow Bonesman William Howard Taft. Stimson later became Coolidge’s Governor-General of the Philippine Islands, Hoover’s Secretary of State, and Secretary of War during the Roosevelt and Truman administrations.

Hollister Bundy (’09) was Stimson’s special assistant and point man in the Pentagon for the Manhattan Project. His two sons, also members of Skull and Bones, were William Bundy (’39) and McGeorge Bundy (’40) — both very active in governmental and foundation affairs.

The two brothers, from their positions in the CIA, the Department of Defense and the State Department, and as Special Assistants to Presidents Kennedy and Johnson, exercised significant impact on the flow of information and intelligence during the Vietnam “War.”

William Bundy went on to be editor of Foreign Affairs, the influential quarterly of the Council on Foreign Affairs (CFR). McGeorge became president of the Ford Foundation.

Another interesting group of “Bonesmen” is the Harriman/Bush crowd. Averil Harriman (’13), “Elder Statesman” of the Democratic Party, and his brother Roland Harriman (’17) were very active members. In fact, four of Roland’s fellow “Bonesmen” from the class of 1917 were directors of Brown Brothers, Harriman, including Prescott Bush (’17), George Bush’s dad.

Since the turn of the century, two investment bank firms — Guaranty Trust and Brown Brothers, Harriman — were both dominated by members of Skull and Bones. These two firms were heavily involved in the financing of Communism and Hitler’s regime.

Bonesman share an affinity for the Hegellian ideas of the historical dialectic, which dictates the use of controlled conflict — thesis versus anti-thesis — to create a pre-determined synthesis. A synthesis of their making and design, where the state is absolute and individuals are granted their freedoms based on their obedience to the state — a New World Order.

Funding and political maneuvering on the part of “Bonesmen” and their allies helped the Bolsheviks prevail in Russia. In defiance of federal laws, the cabal financed industries, established banks and developed oil and mineral deposits in the fledgling U.S.S.R.

Later, Averil Harriman, as minister to Great Britain in charge of Lend-Lease for Britain and Russia, was responsible for shipping entire factories into Russia. According to some researchers, Harriman also oversaw the transfer of nuclear secrets, plutonium and U. S. dollar printing plates to the U.S.S.R.

In 1932, the Union Banking Corporation of New York City had enlisted four directors from the (’17) cell and two Nazi bankers associated with Fritz Thyssen, who had been financing Hitler since 1924.

From “George Bush; The Unauthorized Biography”:

“President Franklin Roosevelt’s Alien Property Custodian, Leo T. Crowley, signed Vesting Order Number 248 [11/17/42] seizing the property of Prescott Bush under the Trading with Enemy Act. The order, published in obscure government record books and kept out of the news, Note #4 explained nothing about the Nazis involved; only that the Union Banking Corporation was run for the ‘Thyssen family’ of ‘Germany and/or Hungary’ — ‘nationals … of a designated enemy country.’

“By deciding that Prescott Bush and the other directors of the Union Banking Corporation were legally ‘front men for the Nazis’, the government avoided the more important historical issue: In what way ‘were Hitler’s Nazis themselves hired, armed, and instructed by’ the New York and London clique of which Prescott Bush was an executive manager? …

“4. New York Times, December 16, 1944, ran a five-paragraph page 25 article on actions of the New York State Banking Department. Only the last sentence refers to the Nazi bank, as follows: ‘The Union Banking Corporation, 39 Broadway, New York, has received authority to change its principal place of business to 120 Broadway.’

“The Times omitted the fact that the Union Banking Corporation had been seized by the government for trading with the enemy, and the fact that 120 Broadway was the address of the government’s Alien Property Custodian.”

After the war, Prescott went on to become a U. S. Senator from Connecticut and favorite golfing partner of President Eisenhower. Prescott claims responsibility for getting Nixon into politics and takes personal credit for bringing Dick on board as Ike’s running mate in 1952.

4. Name Roster of the Secret Establishment

 
The Secret Origins of Skull & BonesThere were so many “Yalies” in the OSS that Yale’s drinking tune, the “Whiffenpoof Song”, became an “unofficial” song of the OSS. Many in the OSS were “Bonesmen” or belonged to the other Yale senior societies.

Robert Lovett (’18), Harriman’s childhood friend, had been tapped into Skull & Bones by Prescott Bush’s cell of ’17 and was a director at Brown Brothers, Harriman.

Again, from “George Bush: The Unauthorized Biography”:

“On October 22, 1945, Secretary of War Robert Patterson created the Lovett Committee, chaired by Robert A. Lovett, to advise the government on the post-World War II organization of U.S. intelligence activities…. The new agency would ‘consult’ with the armed forces, but it must be the sole collecting agency in the field of foreign espionage and counterespionage. The new agency should have an independent budget, and its appropriations should be granted by Congress without public hearings. Lovett appeared before the Secretaries of State, War, and Navy on November 14, 1945…. Lovett pressed for a virtual resumption of the wartime Office of Strategic Services (OSS)…. The CIA was established in 1947 according to the prescription of Robert Lovett, of Jupiter Island.”

Gaddis Smith, a history professor at Yale, said, “Yale has influenced the Central Intelligence Agency more than any other university, giving the CIA the atmosphere of a class reunion.” And “Bonesman” have been foremost among the “spooks” building the CIA’s “haunted house.”

F. Trubee Davison (’18) was Director of Personnel at the CIA in the early years. Some of the other “Bonesmen” connected with the intelligence community are:

  • Sloane Coffin, Jr. (’49)
  • V. Van Dine (’49)
  • James Buckley (’44)
  • Bill Buckley (’50)
  • Hugh Cunnigham (’34)
  • Hugh Wilson (’09)
  • Reuben Holden (’40)
  • Charles R. Walker (’16)
  • Yale’s ‘unofficial’ Secretary of War, Robert D. French (’10)
  • Archibald MacLiesh (’15)
  • Dino Pionzio (’50), CIA Deputy Chief of Station during Allende overthrow
  • William and McGeorge Bundy
  • Richard A. Moore (‘3?)
  • Senator David Boren (’63)
  • Senator John Kerry (’66)

…and, of course, George Herbert Walker Bush. Bush tapped Coffin, who tapped Buckley.

Some other prominent Bonesmen include:

  • Henry Luce (’20), Time-Life
  • John Thomas Daniels (’14), founder Archer Daniels Midland
  • Gifford Pinchot (’89), President Theodore Roosevelt’s chief forester
  • Frederick E. Weyerhaeuser (’96)
  • Harold Stanley (’08), founder of Morgan Stanley, investment banker
  • Alfred Cowles (’13), Cowles Communication
  • Henry P. Davison (’20), senior partner Morgan Guaranty Trust
  • Thomas Cochran (’04) Morgan partner
  • Senator John Heinz (’31)
  • Pierre Jay (’92), first chairman of the Federal Reserve Bank of New York
  • George Herbert Walker, Jr. (’27), financier and co-founder of the NY Mets
  • Artemus Gates (’18), President of New York Trust Company, Union Pacific, TIME, Boeing Company
  • William Draper III (50), the Defense Department, UN and Import-Export Bank
  • Dean Witter, Jr.(’44), investment banker
  • Senator Jonathan Bingham (’36)
  • Potter Stewart (’36), Supreme Court Justice
  • Senator John Chaffe (’47)
  • Harry Payne Whitney (’94), husband of Gertrude Vanderbilt, investment banker
  • Russell W. Davenport (’23), editor Fortune Magazine, created Fortune 500 list
  • Evan G. Galbraith (’50), Ambassador to France and Managing Director of Morgan Stanley
  • Richard Gow (’55), president Zapata Oil
  • Amory Howe Bradford (’34), husband of Carol Warburg Rothschild and general manager for the New York Times
  • C. E. Lord (’49), Comptroller of the Currency
  • Winston Lord (’59), Chairman of CFR, Ambassador to China and assistant Secretary of State in the Clinton administration

Ever since Nixon re-established America’s political relationship with China, many of our ambassadors to that country have been Bonesmen, including George Bush, the first Chief U. S. Liaison Officer to the Peoples Republic of China.

5. China and the Opium Wars

 
The Secret Origins of Skull & BonesWhy all this interest in China? Well, China, among other things, is one of the largest producers and users of opiates in the world.

For a while, in the 1800s, the Yankee Clippers in Connecticut and Massachusetts were the fastest ships on the ocean. Speed was crucial to the opium trade; whoever made the trip from Turkey/India to Macao/Hong Kong/Shanghai first got the most for their goods.

During the Opium Wars, the U.S. chose to stand on the sidelines and cheer for the English and French, knowing that treaty obligations would bring the U.S. a share in the spoils. Russell and Company was at times the only trading house operating in Canton and used the opportunity to developed strong commercial ties and handsome profits.

Powerful national interests were behind the drug trade, because American traders were badly in need of some article the Chinese would buy, since by this time the seal breeding grounds had been nearly wiped out. If the Chinese had not bought opium from Americans, then United States imports of silk, porcelain and tea would have to paid in precious coin, which was in short supply. In 1843, when the Port of Shanghai was opened, Russell and Co. was one of its earliest traders.

In 1903, Yale Divinity School set up a program of schools and hospitals in China. Mao Zedong was among the staff. During the intrigues of China in the 1930s and ’40s, American intelligence called upon the resources of “Yale in China”, and George Bush’s cousin and fellow “Bonesman” Reuben Holden.

After stints as UN Ambassador and Chairman of the Republican National Committee for the beleaguered Richard Nixon, George Bush was sent to look after the “China trade”. The Bush family is still very much involved in the economic activities of “Red” China.

Many researchers contend that George Bush has been with CIA since the early 1950s, and that one of his jobs was to consolidate and co-ordinate the worldwide narcotics industry, the largest industry on Earth. Some say that one of the reasons behind the Vietnam “Police Action” was a cover for the consolidation of the “Golden Triangle”.

6. The War on Drugs: An “Intellectual Fraud”

 
The Secret Origins of Skull & BonesBefore the Vietnam “War”, the Golden Triangle was run by French Intelligence and Corsican mobsters. After the French bailed out and America moved in, the triangle was run by U.S. intelligence, with aid from Sicilian mobsters. This narcotics network is well documented in “The Politics of Heroin in S. E. Asia” by Alfred McCoy, “The Great Heroin Coup” by Henrik Kruger and “Double-Cross” by Sam and Chuck Giancana.

Vice-President George Bush, as Chairman of President Reagan’s cabinet-level working group and as Director of the National Narcotics Interdiction System, was the highest U. S. governmental official involved in the “war on drugs”.

Frances Mullen, Jr., former head of the Drug Enforcement Agency (DEA), called Bush’s efforts “an intellectual fraud” and “a liability rather than an asset”. Soon after these statements, Mullen resigned and the resultant General Accounting Office (GAO) report was buried.

In July, 1985, the suppressed GAO paper reported that there were “no benefits from the National Narcotics Border Interdiction System, directed by George Bush. In fact, the overall effect was to encourage supply….”

Monika Jensen-Stevenson, a “60 Minutes” producer, quit her job after the CBS news program refused to air the story she had uncovered relating to the covert drug trade. Her book, “Kiss The Boys Goodbye”, details how our intelligence community used the apparatus of the POW/MIA governmental agencies as a cover for the trafficking of opiates from the “Golden Triangle”.

President Reagan appointed Reform Party founder and Texas billionaire Ross Perot to the President’s Advisory Council on Foreign Intelligence. Reagan made Perot a special presidential investigator, looking into America’s POW and MIAs from the Vietnam “War”.

Ross took the job to heart and spent considerable time and money in pursuit of the quest. He was given special clearance and access. He asked questions and interviewed everyone he could find.

From “Kiss The Boys Goodbye”:

“Relations between Bush and Perot had gone downhill ever since the Vice-President had asked Ross Perot how his POW/MIA investigations were going.

‘Well, George, I go in looking for prisoners,’ said Perot, ‘but I spend all my time discovering the government has been moving drugs around the world and is involved in illegal arms deals…. I can’t get at the prisoners because of the corruption among our own people.’

“This ended Perot’s official access to the highly classified files as a one-man presidential investigator. ‘I have been instructed to cease and desist,’ he had informed the families of missing men early in 1987.”

The wholesale importation of cocaine into the U.S. during “Iran/Contra” is also well documented. George Bush, is known “to be in the loop” with many of the players keeping in contact directly with his office.

Also, there has been much speculation as to the use of the off-shore rigs, pipelines and other assets of Zapata Offshore being used for narcotic trans-shipments.

Narcotics such as cocaine and heroin cannot be manufactured without the precursor chemicals. One of the largest makers of these precursor chemicals is the Eli Lilly Company of Indianapolis, Indiana. The Quayle family is a large stockholder, and George Bush has been on the Board of Directors. Eli Lilly is also the company that first synthesized LSD for the CIA.

7. George Bush, Skull & Bones and the JFK Assassination

 
The Secret Origins of Skull & BonesRodney Stich’s book “Defrauding America” tells of a “deep-cover CIA officer” assigned to a counter-intelligence unit, code-named Pegasus. This unit “had tape-recordings of plans to assassinate Kennedy” from a tap on the phone of J. Edgar Hoover. The people on the tapes were “[Nelson] Rockefeller, Allen Dulles, [Lyndon] Johnson of Texas, George Bush and J. Edgar Hoover.”

Could George Bush be involved in the JFK assassination?

In 1963, Bush was living in Houston, busily carrying out his duties as president of the Zapata Offshore oil company. He denied the existence of a note sent by the FBI’s J. Edgar Hoover to “Mr. George Bush of the CIA.” When news of the note surfaced, the CIA first said they never commented on employment questions, but later relented said yes, a “George Bush” was mentioned in the note, but that it was “another” George Bush, not the man who took office in the White House in 1988.

Some intrepid reporters tracked down the “other” George Bush and discovered that he was just a lowly clerk who had shuffled papers for the CIA for about six months. He never received any interagency messages from anybody at the FBI, let alone the Queen Mary.

It is also worth noting that a CIA code word for Bay of Pigs was Operation Zapata, and that two of the support vessels were named Barbara and Houston.

Many say that George Bush was high up on the CIA ladder at the time, running proprietorial vehicles and placed in a position of command, responsible for many of the Cubans recruited into “service” at the time. All through the Iran-Contra affair, Felix Rodriguez, the man who captured and had Che Guevara killed for the CIA, always seemed to call Bush’s office first.

From The Realist (Summer, 1991):

“Bush was working with the now-famous CIA agent, Felix Rodriguez, recruiting right-wing Cuban exiles for the invasion of Cuba. It was Bush’s CIA job to organize the Cuban community in Miami for the invasion…. A newly discovered FBI document reveals that George Bush was directly involved in the 1963 murder of President John Kennedy. The document places marksmen by the CIA. Bush at that time lived in Texas. Hopping from Houston to Miami weekly, Bush spent 1960 and ’61 recruiting Cubans in Miami for the invasion….

“George Bush claims he never worked for the CIA until he was appointed Director by former Warren Commission director and then president Jerry Ford in 1976. Logic suggests that is highly unlikely. Of course, Bush has a company duty to deny being in the CIA. The CIA is a secret organization. No one ever admits to being a member. The truth is that Bush has been a top CIA official since before the 1961 invasion of Cuba, working with Felix Rodriguez. Bush may deny his actual role in the CIA in 1959, but there are records in the Bay of Pigs invasion of Cuba that expose Bush’s role…”

On the Watergate tapes, June 23, 1972, referred to in the media as the ‘smoking gun’ conversation, Nixon and his Chief of Staff, H.R. Haldeman, were discussing how to stop the FBI investigation into the CIA Watergate burglary. They were worried that the investigation would expose their connection to ‘the Bay of Pigs thing.’ Haldeman, in his book “The Ends of Power”, reveals that Nixon always used code words when talking about the 1963 murder of JFK. Haldeman said Nixon would always refer to the assassination as ‘the Bay of Pigs’.

On that transcript we find Nixon discussing the role of George Bush’s partner, Robert Mosbacher, as one of the Texas fundraisers for Nixon. On the tapes Nixon keeps referring to the ‘Cubans’ and the ‘Texans.’ The ‘Texans’ were Bush, Mosbacher and Baker. This is another direct link between Bush and evidence linking Nixon and Bush to the Kennedy assassination.”

8. Motives for the Conspiracy

 
The Secret Origins of Skull & BonesSo, why would an intelligence agency/secret society want to smuggle drugs and assassinate JFK?

Well, they make a lot of money, and they garner intelligence assets through their participation. There’s also the rationale that the world is a seamy and unseemly place, and if you’re going to be the ‘big boy’ on the block, you better know what’s going on. And what better way of knowing than by running it yourself? There are also some who theorize that the covert drug trade fits with plans to destabilize American families and society. Through demoralizing and fracturing the body politic, they can impose their will using psychological warfare and the political alchemy of the Hegellian dialectic.

James Shelby Downard’s article, “Sorcery, Sex, Assassination and the Science of Symbolism ,” an underground classic, links American historical events with a wild, numerological, grand occult plan “to turn us into cybernetic mystery zombies”. The assassination of JFK, this article contends, was the performance of a public occult ritual called The Killing of the King, designed as a mass-trauma, mind-control assault against our U.S. national body-politic.

During Operation Sunrise, Operation Blowback, Operation Paperclip and others, thousands of Nazi scientists, researchers and administrators were brought to the United States after World War II. Many were “smuggled” into the country against direct, written, orders from President Harry S. Truman.

Project Monarch was the resumption of a mind-control project called Marionette Programming, which started in Nazi Germany. The basic component of the Monarch Program is the sophisticated manipulation of the mind, using extreme trauma to induce Multiple Personality Disorder.

Mr. Downward feels that the perpetrators purposefully murdered JFK in such a way as to affect our National identity and cohesiveness — to fracture America’s soul. Even the blatancy of their conspiracy was designed to show “their superiority” and “our futility”.

There have been studies that show a correlation between the JFK assassination and the rise in violence in society, distrust of government and other extensions of social ills.

9. The Illuminati: Subverting the Body Politic

 
The Secret Origins of Skull & BonesWhy this attack against our body politic?

In 1785, a bolt of lightning struck a courier en route to Paris from Frankfort-on-the-Main. A tract written by Adam Weishaupt, founder of the Illuminati, “Original Shift in Days of Illuminations,” was recovered from the dead messenger, containing the secret society’s long-range plan for “The New World Order through world revolution”.

The Bavarian Government outlawed the society and in 1787 published the details of The Illuminati conspiracy in “The Original Writings of the Order and Sect of the Illuminati.”

In Adam Weishaupt’s own words:

“By this plan, we shall direct all mankind in this manner. And, by the simplest means, we shall set all in motion and in flames. The occupations must be so allotted and contrived that we may, in secret, influence all political transactions.”

There is disagreement among scholars as to whether or not the Illuminati survived its banishment. Nevertheless, the group had been quite successful in attracting members and had allied itself with the extensive Masonic networks.

The Illuminati was publicly founded May 1, 1776 at the University of Ingolstadt by Weishaupt, Professor of Canon Law. It was a very “learned” society; Weishaupt drew the earliest members of his new order from among his students.

On December 5, 1776, students at William and Mary College founded a secret society, Phi Beta Kappa. A second chapter was formed, at Yale, in 1780. The anti-Masonic movement in the United States during the 1820s held groups such as Phi Beta Kappa in a bad light. Because of pressure, the society went public. This is noted by some researchers as the direct cause of the appearance of Yale’s Order of Skull and Bones.

In “The Cyclopedia Of Fraternities”, a genealogical chart of general Greek-Letter college fraternities in the United States, shows Phi Beta Kappa as “the parent of all the fraternal systems in [American] higher education.” There is only one “side” lineal descendant: the Yale chapter of 1780. The line then continues to Skull and Bones in 1832, and on through the other “only at Yale” senior societies, Scroll & Key and Wolf’s Head.

Phi Beta Kappa is the “first three Greek letters, for ‘Philosophia Biou Kubernetes’ or ‘Love of wisdom, the helmsman of life’.” A skull homophone is scull, a quick, gliding boat and part of Skull & Bones first nomenclature.

John Robison, a professor of natural philosophy at Edinburgh University in Scotland and a member of a Freemason Lodge, said that he was asked to join the Illuminati. After study, he concluded the purposes of the Illuminati were not for him.

In 1798, he published a book called “Proofs Of A Conspiracy”:

“An association has been formed for the express purpose of rooting out all the religious establishments and overturning all the existing governments…. the leaders would rule the World with uncontrollable power, while all the rest would be employed as tools of the ambition of their unknown superiors.”

“Proofs of A Conspiracy” was sent to George Washington. Responding to the sender of the book with a letter, the president said he was aware the Illuminati were in America. He felt that the Illuminati had “diabolical tenets” and that their object was “a separation of the People from their government.”

In “Proofs Of A Conspiracy”, Robison printed the ceremony of initiation of the “Regent degree” in Illuminism. In it “a skeleton is pointed out to him [the initiate], at the feet of which are laid a crown and a sword. He is asked ‘whether that is the skeleton of a king, nobleman or a beggar.’ As he cannot decide, the president of the meeting says to him, ‘The character of being a man is the only one that is importance'”.

This is, essentially, the same as the writing in the Skull & Bones “tomb”:

“Wer war der Thor, wer Weiser, Bettler oder Kaiser? Ob Arm, ob Reich, im Tode gleich.”

Which reads:

“Who was the fool, who the wise man, beggar or king? Whether poor or rich, all’s the same in death.”

10. Skull & Bones = Illuminati?

 
The Secret Origins of Skull & BonesIs the Order of the Skull & Bones part of the Illuminati?

When a person is initiated into Skull & Bones, they are given a new name, similar to the practice of the Illuminati. And many recorded Illuminati members can be shown to have contact and/or strong influences with many of the professors that taught “Bonesmen” in Berlin.

When a secret society conspires against the sovereignty of a king, they need to organize, raise funds, make their plans operational, and hopefully bring them to fruition.

Could we have in the United States a secret society that has used the “National Security State” as a cover for their nefarious plans?

From “George Bush: The Unauthorized Biography”:

“That September [1951], Robert Lovett replaced Marshall as secretary of defense. Meanwhile, Harriman was named director of the Mutual Security Agency, making him the U.S. chief of the Anglo-American military alliance. By now, Brown Brothers, Harriman was everything but commander-in-chief.

“A central focus of the Harriman security regime in Washington (1950-53) was the organization of covert operations and ‘psychological warfare.’ Harriman, together with his lawyers and business partners, Allen and John Foster Dulles, wanted the government’s secret services to conduct extensive propaganda campaigns and mass-psychology experiments within the U.S.A., and paramilitary campaigns abroad….

“The Harriman security regime created the Psychological Strategy Board (PSB) in 1951. The man appointed director of the PSB [was] Gordon Gray…. Gordon’s brother, R.J. Reynolds chairman Bowman Gray Jr., was also a naval intelligence officer, known around Washington as the ‘founder of operational intelligence.’ Gordon Gray became a close friend and political ally of Prescott Bush; and Gray’s son became for Prescott’s son, George, his lawyer and the shield of his covert policy.”

So you have the Whitney/Stimson/Bundy clan and the Harriman/Bush boys wielding a tremendous amount of influence on the political, economic and social affairs of America and the world. Then you have Prescott Bush’s buddy Richard Nixon as an activist vice-president. Then, a nation-chilling assassination, some time under LBJ with the Bundy boys keeping things in line, then Nixon as President with “Bonesmen” aides Ray Price (’51) and Richard A. Moore. Some time out for a Trilateralist-Democrat-patsy president, followed by Prescott’s son as an activist vice-president under Reagan. Next, we get a Skull and Bones president who declares a “New World Order” while beating up on his business partner, Saddam Hussein.

After twelve years of Republican administrations, Bush passes the reins to his drug smuggling buddy from Arkansas, Bill Clinton, who studied at Yale Law School. According to some researchers, Clinton was recruited as a CIA operative while a Rhodes Scholar at Oxford. Could this be the “old Hegallian historical dialectic process”?

11. World History: Plan or Accident?

 
The Secret Origins of Skull & BonesWill we get another failed Democratic administration? A scandal as disgraceful as Nixon’s fall? When Robert P. Johnson (William Barr) told Clinton in a bunker in Arkansas that “you are our fair-haired boy, but you do have competition for the job you seek. We would never put all our eggs in one basket. You and your state have been our greatest asset…. Mr. Casey wanted me to pass on to you, that unless you fuck up and do something stupid, you are number one on our short list for shot at the job you always wanted.”

So, you have William Casey — CIA Director, George Bush’s campaign manager and Sovereign Knight of Malta — speaking through the proxy of George Bush’s last Attorney General to George’s rival in the 1992 federal elections. Is it all just a show and sham for U.S. hoi polloi?

Perhaps so, if there exists the type of control over the electoral process as told by Mae Brussell and the suppressed book “VoteScam,” written by Jim and Ken Collier:

“…Your vote and mine may now be a meaningless bit of energy directed by preprogrammed computers-which can be fixed to select certain pre-ordained candidates and leave no footprints or paper trail.

“In short, computers are covertly stealing your vote.

“–For almost three decades the American vote has been subject to government-sponsored electronic theft.

“–The vote has been stolen from you by a cartel of federal “national security” bureaucrats, who include higher-ups in the Central Intelligence Agency, political party leaders, Congressmen, co-opted journalists — and the owners and managers — of the major Establishment news media, who have decided in concert that how America’s votes are counted, by whom they are counted and how the results are verified and delivered to the public is, as one of them put it, ‘Not a proper area of inquiry.’

“–By means of an unofficial private corporation named News Election Service (NES), the Establishment press has actual physical control of the counting and dissemination of the vote, and it refuses to let the public know how it is done.”

Is the American electorate subjected to cyclic propaganda, pre-selected candidates and winners, and psychological warfare to alienate Americans from the institutions established to serve them by the Constitution? Are the Democratic and Republican National Parties used for a Hegellian experiment in controlled conflict?

Pamela Churchill Harriman, Averil’s wife, is one of the Democratic Party’s biggest fund-raisers. She once gave Bill a job as director of her “PAM PAC” when he was defeated for governor in 1980. Bill paid her back by appointing her as Ambassador to France.

Another Harriman/Bush friend, Eugene Stetson (’34), was an assistant manager for Prescott Bush at Brown Brothers, Harriman’s New York office. He organized the H. Smith Richardson Foundation. The foundation, in the late 1950s, participated in the MKULTRA, the CIA’s domestic covert psychological warfare operation. The Richardson Foundation helped to finance the testing of psychotropic drugs, including LSD, at Bridgewater Hospital in Massachusetts, the center of some of the most brutal MK-ULTRA experiments.

During the Iran-Contra operations, the H. Smith Richardson Foundation was a “private donors steering committee,” working with the National Security Council to co-ordinate the Office of Public Diplomacy. This was an effort to propagandize in favor of and run cover for the Iran-Contra operations, and to coordinate published attacks on opponents of the program.

The H. Smith Richardson Foundation also runs the Center for Creative Leadership at Langley to “train leaders of the CIA,” as well as another center near Greensboro, North Carolina, that trains CIA and Secret Service Agents. Almost everyone who achieves the military rank of general also gets this training.

This is just the tip of an iceberg. You also have eugenics and population control, suppressed history and technology, yearly retreats, profitable partnerships with brutal dictators, deals with “terrorists”, the involvement of the Knights of Malta, war-mongering and profiteering, mind-control, secret societies for teens, ritual magic and more — all spinning the dark threads in the web of conspiracy that our spinning blue ball has gotten caught in.

We’ve got a whole new crop of “Bonesmen” coming up, including George H.W. Bush’s son George W. Bush (’68), Governor of Texas.

When Don Schollander (’68), the Olympic gold-medalist and only known Skull and Bones member living in Portland, was contacted by Willamette Week reporter John Schrang regarding his involvement in the Order, he said, “It’s really something I can’t talk about.”

Not wouldn’t, but “couldn’t”.

In wake of Antony Sutton’s first ground-breaking exposes of the Order, the Sterling Library at Yale has refused to allow any other researchers access to the Russell Trust papers.

Daniel Gilman, like most Bonesmen, makes no mention of Skull & Bones or the Russell Trust in his memoirs or biographies.

So, are we all just ‘fodder” for a secret society with satanic overtones that is attempting to form a one world government with themselves at the helm? Or is the Order of Skull and Bones just a bunch of frat boys from Yale? Wanna bet your future on it?

The Order Of Skull And Bones

 
via

Apr 102017
 
Superhuman abilities have been studied for thousands of years in all walks of life. Religious ‘miracles’ often with hundreds of witnesses have been said to be due to psychic abilities, but studies in China have overwhelming proof that these stories are more than just speculation.

CIA Document Confirms Reality Of Humans With ‘Superhuman Powers’

For the past 20 years scientists have been studying subjects in China who appear to have superhuman powers, and the results have been published in many journals and books.

It is thought that these gifted people have been able to tap into a quantum level, unobservable by the human eye..

To understand properly, you need to be aware of the relationship between our consciousness and our physical reality. Both things are very real, and they have a very complicated relationship. Inventor of quantum theory Max Planck said we should regard consciousness as “fundamental” and matter as “derivative from consciousness.”

Another physicist Eugene Wigner has said on the matter “it was not possible to formulate the laws of quantum mechanics in a fully consistent way without reference to consciousness.”

The document containing the information about the events in China is called “Chronology of Recent Interest in Exceptional Functions of The Human Body in the People’s Republic of China.” The document talks about the Chinese government and it’s work with parapsychology, that is remote viewing, telepathy, psychokinesis.

The document has only recently become available due to a Freedom of Information Act request (FOIA), and it includes interesting details of individuals who have purported superhuman abilities, and that they have been studies countless times by scientists all over the world. The document is on the CIA website, but can only be accessed by the ‘Internet Archives’.

A brief outline of the important items in it the CIA document include:

  • In 1979, a major Chinese science journal, Ziran Zachi, printed a report on “non-visual pattern recognition” where several accounts of exceptional human body function were confirmed.
  • In 1980, the Journal and the Chinese Human Body Science Association held a parapsychology conference in Shanghai with participants from over 20 research institutes and universities from around the world.
  • In 1981, there was a formation of over 100 special places to study children with exceptional abilities with over 100 formally trained scholars.
  • In 1982, the Chinese Academy of Sciences sponsored a public hearing in Beijing and the sole purpose was to discuss humans with parasychological abilities, there were over 400 scholars in attendance.
CHRONOLOGY OF RECENT INTEREST IN EXCEPTIONAL FUNCTIONS OF THE HUMAN BODY IN THE PEOPLE’S REPUBLIC OF CHINA

CIA-RDP96-00792R000400300011-9

Zhang Baosheng

In April of 1982, the Party’s National Committee of Science at Beijing Teacher’s College held a trial to test the abilities of certain students. Most of the results came back negative, apart from Zhang Baosheng. The next year, Zhang was studied again, this time by 19 researchers led by Prof. Lin Shuhang of the physics department of Beijing Teachers college, positive results were recorded for his superhuman powers.

Zhang was able to move objects in and out of sealed containers using only the power of his mind. Prof. Shuhang studied Zhang for six months and he was repeatedly able to place small pieces of paper into sealed test tubes, and then take them out again, without touching them. He repeated the tests with other small items like paperclips and insects, and Zhang could move these, too.

A film was made by the Institute of Space-Medico Engineering in 1987 showcasing the results, which showed a medicine pill moving through an irreversibly sealed glass vial, which occurred in three frames of a 400 frame per second film.

Another release from the CIA (Research Into Paranormal Ability To Break Through Spatial Barriers) contains this description of Zhang’s abilities:

A wooden cabinet 120 by 180 by 60 centimeters was used as a sealed container. Sheets of papers and boards with one of a kind markings were used as the target objects and placed inside the cabinet on the upper shelf. Without damaging the cabinet or opening the door, the person with ESP was able to remove the target objects and also was able to put them back inside. This demonstrates that even when using especially large container it is possible to completely break through spacial barriers, however, the success rate was much lower and was exceptionally difficult. (source)

According to Eric Davis, Ph.D, FBIS, there were other children like Zhang. A declassified US Air Force document obtained via the Federation of American Scientists, contained a report from Shuhuang that ‘gifted children’ could teleport small, physical objects from one place to another. Objects like watches, horseflies, other insects, radio micro-transmitters, photosensitive paper , without ever touching the objects beforehand. The research was carried out by the prestigious Department of Defense, and is a noteworthy case because it was deemed necessary that an unclassified Intelligence Information Report be prepared for public viewing.

In a similar study, Dr. Dean Radin, Chief Scientists at the Institute of Noetic Sciences they were able to record pieces of paper being teleported into sealed plastic containers, the report was published in 2010 by retired research chemist Dong Shen. The most fascinating part of this study, is that the teleportation techniques were taught to other students with a success rate of 40%. This information is published in his book, Supernormal.

Dr. Dean Radin, states:

“Evaluating the details and credibility of these studies have been difficult because many of the papers appear only in Chinese. The techniques have not yet been reported outside of China, and the experimental methods employed in conducting such tests do not appear to be as rigorously controlled as compared to typical Western methods…”

Although, Eric Davis has said,

“The results of the Chinese Teleportation experiments can simply be explained as a human consciousness phenomenon that somehow acts to move or rotate test specimens through a 4th spacial dimension, so that specimens are able to penetrate the solid walls/barriers of their containers without physically breaching them.”

The American Journal of Chinese Medicine has evidence of a similar, amazing story of a woman named Chulin Sun. The study in the US National Library of Medicine documents this lady’s ability to speed up the growth of seeds to an amazing rate.

The study states:
Chulin Sun is a woman with exceptional powers (Shen and Sun, 1996, 1998; Sun, 1998). A member of the Chinese Somatic Science Research Institute, she is a practitioner of Waiqi. Waiqi is a type of qigong that teaches the practitioner to bring the qi energy of traditional Chinese medicine under the control of the mind. Chulin Sun can induce plant seeds to grow shoots and roots several cm long within 20 min using mentally projected qi energy.

This has been demonstrated on more than 180 different occasions at universities as well as science and research institutions in China (including Taiwan and Hong Kong) as well as other countries (e.g., Japan, Thailand, Malaysia, etc.) (Ge et al., 1998; Qin et al., 1998; Lee et al., 1999). We took part in and repeated the qi germination experiments seven times, and five of them succeeded (Ge et al., 1998). This remarkable effect on seed development has drawn widespread attention (Tompkins and Bird, 1973; Lee, 1998), but the biological mechanisms that underlie this phenomenon are unknown.

Sun is thought to have been able to do this by tapping into a level of Qi.

Qi is described as the ‘oneness’ that is flowing through everything all of the time. It is responsible for every good and bad thing that happens to you, and to harness it and use it for good, you must be free of the constraints of the physical world.

These studies prove that ‘super-humans’ may exist and that they may not fully understood by mainstream science, The unwillingness by the government to allow them to be studied in the public eye means only the secret intelligence services are the ones who really understand the extent of these extraordinary human beings.