Apr 262017
 

These 25 ways are everywhere in media, from political debates, to television shows, to comments on social media.

25 Ways To Suppress Truth: The Rules of Disinformation

Built upon Thirteen Techniques for Truth Suppression by David Martin, the following may be useful to the initiate in the world of dealing with veiled and half-truth, lies, and suppression of truth when serious crimes are studied in public forums. This, sadly, includes every day news media, one of the worst offenders with respect to being a source of disinformation. Where the crime involves a conspiracy, or a conspiracy to cover up the crime, there will invariably be a disinformation campaign launched against those seeking to uncover and expose the truth and/or the conspiracy. There are specific tactics which disinfo artists tend to apply, as revealed here. Also included with this material are seven common traits of the disinfo artist which may also prove useful in identifying players and motives. The more a particular party fits the traits and is guilty of following the rules, the more likely they are a professional disinfo artist with a vested motive. People can be bought, threatened, or blackmailed into providing disinformation, so even “good guys” can be suspect in many cases.

A rational person participating as one interested in the truth will evaluate that chain of evidence and conclude either that the links are solid and conclusive, that one or more links are weak and need further development before conclusion can be arrived at, or that one or more links can be broken, usually invalidating (but not necessarily so, if parallel links already exist or can be found, or if a particular link was merely supportive, but not in itself key) the argument. The game is played by raising issues which either strengthen or weaken (preferably to the point of breaking) these links. It is the job of a disinfo artist to interfere with these evaluation… to at least make people think the links are weak or broken when, in truth, they are not… or to propose alternative solutions leading away from the truth. Often, by simply impeding and slowing down the process through disinformation tactics, a level of victory is assured because apathy increases with time and rhetoric.

It would seem true in almost every instance, that if one cannot break the chain of evidence for a given solution, revelation of truth has won out. If the chain is broken either a new link must be forged, or a whole new chain developed, or the solution is invalid an a new one must be found… but truth still wins out. There is no shame in being the creator or supporter of a failed solution, chain, or link, if done with honesty in search of the truth. This is the rational approach. While it is understandable that a person can become emotionally involved with a particular side of a given issue, it is really unimportant who wins, as long as truth wins. But the disinfo artist will seek to emotionalize and chastise any failure (real or false claims thereof), and will seek by means of intimidation to prevent discussion in general.

Twenty-Five Rules of Disinformation
  1. Hear no evil, see no evil, speak no evil
  2. Become incredulous and indignant
  3. Create rumor mongers
  4. Use a straw man
  5. Sidetrack opponents w name calling, ridicule
  6. Hit and Run
  7. Question motives
  8. Invoke authority
  9. Play Dumb
  10. Associate opponent charges with old news
  11. Establish and rely upon fall-back positions
  12. Enigmas have no solution
  13. Alice in Wonderland Logic
  14. Demand complete solutions
  15. Fit the facts to alternate conclusions
  16. Vanish evidence and witnesses
  17. Change the subject
  18. Emotionalize, Antagonize, and Goad
  19. Ignore facts, demand impossible proofs
  20. False evidence
  21. Call a Grand Jury, Special Prosecutor
  22. Manufacture a new truth
  23. Create bigger distractions
  24. Silence critics
  25. Vanish
Eight Traits of The Disinformationalist
  1. Avoidance
  2. Selectivity
  3. Coincidental
  4. Teamwork
  5. Anti-conspiratorial
  6. Artificial Emotions
  7. Inconsistent
  8. Newly Discovered: Time Constant

It is the disinfo artist and those who may pull their strings (those who stand to suffer should the crime be solved) MUST seek to prevent rational and complete examination of any chain of evidence which would hang them. Since fact and truth seldom fall on their own, they must be overcome with lies and deceit. Those who are professional in the art of lies and deceit, such as the intelligence community and the professional criminal (often the same people or at least working together), tend to apply fairly well defined and observable tools in this process. However, the public at large is not well armed against such weapons, and is often easily led astray by these time-proven tactics. Remarkably, not even media and law enforcement have NOT BEEN TRAINED to deal with these issues. For the most part, only the players themselves understand the rules of the game.

This why concepts from the film, Wag-The-Dog, actually work. If you saw that movie, know that there is at least one real-world counterpart to Al Pacino’s character. For CIA, it is Mark Richards, who was called in to orchestrate the media response to Waco on behalf of Janet Reno. Mark Richards is the acknowledged High Priest of Disinformation. His appointment was extremely appropriate, since the CIA was VERY present at Waco from the very beginning of the cult to the very end of their days — just as it was at the People’s Temple in Jonestown. Richards purpose in life is damage control.

For such disinformationalists, the overall aim is to avoid discussing links in the chain of evidence which cannot be broken by truth, but at all times, to use clever deceptions or lies to make select links seem weaker than they are, create the illusion of a break, or better still, cause any who are considering the chain to be distracted in any number of ways, including the method of questioning the credentials of the presenter. Please understand that fact is fact, regardless of the source. Likewise, truth is truth, regardless of the source. This is why criminals are allowed to testify against other criminals. Where a motive to lie may truly exist, only actual evidence that the testimony itself IS a lie renders it completely invalid. Were a known ‘liar’s’ testimony to stand on its own without supporting fact, it might certainly be of questionable value, but if the testimony (argument) is based on verifiable or otherwise demonstrable facts, it matters not who does the presenting or what their motives are, or if they have lied in the past or even if motivated to lie in this instance — the facts or links would and should stand or fall on their own merit and their part in the matter will merely be supportive.

Moreover, particularly with respects to public forums such as newspaper letters to the editor, and Internet chat and news groups, the disinfo type has a very important role. In these forums, the principle topics of discussion are generally attempts by individuals to cause other persons to become interested in their own particular position, idea, or solution — very much in development at the time. People often use such mediums as a sounding board and in hopes of pollination to better form their ideas. Where such ideas are critical of government or powerful, vested groups (especially if their criminality is the topic), the disinfo artist has yet another role — the role of nipping it in the bud. They also seek to stage the concept, the presenter, and any supporters as less than credible should any possible future confrontation in more public forums result due to their early successes. You can often spot the disinfo types at work here by the unique application of “higher standards” of discussion than necessarily warranted. They will demand that those presenting arguments or concepts back everything up with the same level of expertise as a professor, researcher, or investigative writer. Anything less renders any discussion meaningless and unworthy in their opinion, and anyone who disagrees is obviously stupid — and they generally put it in exactly those terms.

So, as you read any such discussions, particularly so in Internet news groups (NG), decide for yourself when a rational argument is being applied and when disinformation, psyops (psychological warfare operations) or trickery is the tool. Accuse those guilty of the later freely. They (both those deliberately seeking to lead you astray, and those who are simply foolish or misguided thinkers) generally run for cover when thus illuminated, or — put in other terms, they put up or shut up (a perfectly acceptable outcome either way, since truth is the goal.) Here are the twenty-five methods and seven traits, some of which don’t apply directly to NG application. Each contains a simple example in the form of actual (some paraphrased for simplicity) from NG comments on commonly known historical events, and a proper response. Accusations should not be overused — reserve for repeat offenders and those who use multiple tactics. Responses should avoid falling into emotional traps or informational sidetracks, unless it is feared that some observers will be easily dissuaded by the trickery. Consider quoting the complete rule rather than simply citing it, as others will not have reference. Offer to provide a complete copy of the rule set upon request (see permissions statement at end):

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

(1) Hear No Evil, See No Evil, Speak No Evil

Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

Example: Media was present in the courtroom (Hunt vs. Liberty Lobby) when CIA agent Marita Lorenz ‘confession’ testimony regarding CIA direct participation in the planning and assassination of John Kennedy was revealed. All media reported was that E. Howard Hunt lost his libel case against Liberty Lobby (Liberty Lobby’s newspaper, The Spotlight, had reported Hunt was in Dallas that day and were sued for the story). See Mark Lane’s remarkable book, Plausible Denial, for the full confessional transcript.

Proper response: There is no possible response unless you are aware of the material and can make it public yourself.. In any such attempt, be certain to target any known silent party as likely complicit in a cover up. In this case, it would be the entire Time-Warner Media Group, among others. This author is relatively certain that reporters were hand-picked to cover this case from among those having intelligence community ties.

(2) Become Incredulous and Indignant

Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

Example: ‘How dare you suggest that the Branch Davidians were murdered! the FBI and BATF are made up of America’s finest and best trained law enforcement, operate under the strictest of legal requirements, and are under the finest leadership the President could want to appoint.’

Proper response: You are avoiding the Waco issue with disinformation tactics. Your high opinion of FBI is not founded in fact. All you need do is examine Ruby Ridge and any number of other examples, and you will see a pattern of abuse of power that demands attention to charges against FBI/BATF at Waco. Why do you refuse to address the issues with disinformation tactics (rule 2 – become incredulous and indignant)?

(3) Create Rumor Mongers

Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

‘You can’t prove his material was legitimately from French Intelligence. Pierre Salinger had a chance to show his ‘proof’ that flight 800 was brought down by friendly fire, and he didn’t. All he really had was the same old baseless rumor that’s been floating around the Internet for months.’

Proper response: You are avoiding the issue with disinformation tactics. The Internet charge reported widely is based on a single FBI interview statement to media and a similar statement by a Congressman, neither of which had actually seen Pierre’s document. As the FBI is being accused in participating in a cover up of this matter and Pierre claims his material is not Internet sourced, it is natural that FBI would have reason to paint his material in a negative light. For you to assume the FBI to have no bias in the face of Salinger’s credentials and unchanged stance suggests you are biased. At the best you can say the matter is in question. Further, to imply that material found on Internet is worthless is not founded. At best you may say it must be considered carefully before accepting it, which will require addressing the actual issues. Why do you refuse to address these issues with disinformation tactics (rule 3 – create rumor mongers)?

(4) Use a Straw Man

Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

Example: When trying to defeat reports by the Times of London that spy-sat images reveal an object racing towards and striking flight 800, a straw man is used. The disinformationalist, later identified as having worked for Naval Intelligence, simply stated: ‘If these images exist, the public has not seen them. Why? They don’t exist, and never did. You have no evidence and thus, your entire case falls flat.’

Proper response: ‘You are avoiding the issue with disinformation tactics. You imply deceit and deliberately establish an impossible and unwarranted test. It is perfectly natural that the public has not seen them, nor will they for some considerable time, if ever. To produce them would violate national security with respect to intelligence gathering capabilities and limitations, and you should know this. Why do you refuse to address the issues with such disinformation tactics (rule 4 – use a straw man)?’

(5) Sidetrack Opponents with Name-Calling and Ridicule

This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

Example: ‘You believe what you read in the Spotlight? The Publisher, Willis DeCarto, is a well-known right-wing racist. I guess we know your politics — does your Bible have a swastika on it? That certainly explains why you support this wild-eyed, right-wing conspiracy theory.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply guilt by association and attack truth on the basis of the messenger. The Spotlight is well known Populist media source responsible for releasing facts and stories well before mainstream media will discuss the issues through their veil of silence. Willis DeCarto has successfully handled lawsuits regarding slanderous statements such as yours. Your undemonstrated charges against the messenger have nothing to do with the facts or the issues, and fly in the face of reason. Why do you refuse to address the issues by use of such disinformation tactics (rule 5 – sidetrack opponents with name calling and ridicule)?’

(6) Hit and Run

In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

Example: ”This stuff is garbage. Where do you conspiracy lunatics come up with this crap? I hope you all get run over by black helicopters.’ Notice it even has a farewell sound to it, so it won’t seem curious if the author is never heard from again.

Proper response: ‘You are avoiding the issue with disinformation tactics. Your comments or opinions fail to offer any meaningful dialog or information, and are worthless except to pander to emotionalism, and in fact, reveal you to be emotionally insecure with these matters. If you do not like reading ‘this crap’, why do you frequent this NG which is clearly for the purpose of such discussion? Why do you refuse to address the issues by use of such disinformation tactics (rule 6 – hit and run)?’

(7) Question Motives

Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

Example: ‘With the talk-show circuit and the book deal, it looks like you can make a pretty good living spreading lies.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply guilt as a means of attacking the messenger or his credentials, but cowardly fail to offer any concrete evidence that this is so. If you think what has been presented are ‘lies’, why not simply so illustrate? Why do you refuse to address the issues by use of such disinformation tactics (rule 6 – question motives)?’

(8) Invoke Authority

Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

‘You obviously know nothing about either the politics or strategic considerations, much less the technicals of the SR-71. Incidentally, for those who might care, that sleek plane is started with a pair of souped up big-block V-8’s (originally, Buick 454 C.I.D. with dual 450 CFM Holly Carbs and a full-race Isky cams — for 850 combined BHP @ 6,500 RPM) using a dragster-style clutch with direct-drive shaft. Anyway, I can tell you with confidence that no Blackbird has ever been flown by Korean nationals nor have they ever been trained to fly it, and have certainly never overflown the Republic of China in a SR or even launched a drone from it that flew over China. I’m not authorized to discuss if there have been overflights by American pilots.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your imply your own authority and expertise but fail to provide credentials, and you also fail to address issues and cite sources. You simply cite ‘Jane’s-like’ information to make us think you know what you are talking about. Why do you refuse to address the issues by use of such disinformation tactics (rule 8 – invoke authority)?’

(9) Play Dumb

No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

Example: ‘Nothing you say makes any sense. Your logic is idiotic. Your facts nonexistent. Better go back to the drawing board and try again.’

Proper response: ‘You are avoiding the issue with disinformation tactics. You evade the issues with your own form of nonsense while others, perhaps more intelligent than you pretend to be, have no trouble with the material. Why do you refuse to address the issues by use of such disinformation tactics (Rule 9 – play dumb)?’

(10) Associate Opponent Charges with Old News

A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

Example: ‘Flight 553’s crash was pilot error, according to the NTSB findings. Digging up new witnesses who say the CIA brought it down at a selected spot and were waiting for it with 50 agents won’t revive that old dead horse buried by NTSB more than twenty years ago.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your ignore the issues and imply they are old charges as if new information is irrelevant to truth. Why do you refuse to address the issues by use of such disinformation tactics (rule 10 – associate charges with old news)?’

(11) Establish and Rely Upon Fall-Back Positions

Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

Example: ‘Reno admitted in hindsight she should have taken more time to question the data provided by subordinates on the deadliness of CS-4 and the likely Davidian response to its use, but she was so concerned about the children that she elected, in what she now believes was a sad and terrible mistake, to order the tear gas be used.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your evade the true issue by focusing on a side issue in an attempt to evoke sympathy. Perhaps you did not know that CIA Public Relations expert Mark Richards was called in to help Janet Reno with the Waco aftermath response? How warm and fuzzy it makes us feel, so much so that we are to ignore more important matters being discussed. Why do you refuse to address the issues by use of such disinformation tactics (rule 11 – establish and rely upon fall-back positions)?’

(12) Enigmas Have No Solution

Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.

Example: ‘I don’t see how you can claim Vince Foster was murdered since you can’t prove a motive. Before you could do that, you would have to completely solve the whole controversy over everything that went on in the White House and in Arkansas, and even then, you would have to know a heck of a lot more about what went on within the NSA, the Travel Office, and the secret Grand Jury, and on, and on, and on. It’s hopeless. Give it up.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your completely evade issues and attempt others from daring to attempt it by making it a much bigger mountain than necessary. You eat an elephant one bite at a time. Why do you refuse to address the issues by use of such disinformation tactics (rule 12 – enigmas have no solution)?’

(13) Alice in Wonderland Logic 

Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

Example: ‘The news media operates in a fiercely competitive market where stories are gold. This means they dig, dig, dig for the story — often doing a better job than law enforcement. If there was any evidence that BATF had prior knowledge of the Oklahoma City bombing, they would surely have uncovered it and reported it. They haven’t reported it, so there can’t have been any prior knowledge. Put up or shut up.’

Proper response: ‘You are avoiding the issue with disinformation tactics. Your backwards logic does not work here. Has media reported CIA killed Kennedy when they knew it? No, despite their presence at a courtroom testimony ‘confession’ by CIA operative Marita Lornez in a liable trial between E. Howard Hunt and Liberty Lobby, they only told us the trial verdict. THAT, would have been the biggest story of the Century, but they didn’t print it, did they? Why do you refuse to address the issues by use of such disinformation tactics (rule 13 – Alice in Wonderland logic)?’

(14) Demand Complete Solutions 

Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

Example: ‘Since you know so much, if James Earl Ray is as innocent as you claim, who really killed Martin Luther King, how was it planned and executed, how did they frame Ray and fool the FBI, and why?’

Proper response: You are avoiding the issue with disinformation tactics. It is not necessary to completely resolve any full matter in order to examine any relative attached issue. Discussion of any evidence of Ray’s innocence can stand alone to serve truth, and any alternative solution to the crime, while it may bolster that truth, can also stand alone. Why do you refuse to address the issues by use of such disinformation tactics (rule 14 – demand complete solutions)?

(15) Fit the Facts to Alternate Conclusions

This requires creative thinking unless the crime was planned with contingency conclusions in place.

Example: ‘The cargo door failed on Flight 800 and caused a catastrophic breakup which ruptured the fuel tank and caused it to explode.’

Proper response: The best definitive example of avoiding issues by this technique is, perhaps, Arlan Specter’s Magic Bullet from the Warren Report. This was eloquently defeated in court but media blindly accepted it without challenge. Thus rewarded, disinformationalists do not shrink from its application, even though today, thanks in part to the movie, JFK, most Americans do now understand it was fabricated nonsense. Thus the defense which works best may actually be to cite the Magic Bullet. ‘You are avoiding the issue with disinformation tactics. Your imaginative twisting of facts rivals that of Arlan Specter’s Magic Bullet in the Warren Report. We all know why the impossible magic bullet was invented. You invent a cargo door problem when there has been not one shred of evidence from the crash investigation to support it, and in fact, actual photos of the cargo door hinges and locks disprove you. Why do you refuse to address the issues by use of such disinformation tactics (rule 15 – fit facts to an alternate conclusion)?’

(16) Vanish Evidence and Witnesses

If it does not exist, it is not fact, and you won’t have to address the issue.

Example: ‘You can’t say Paisley is still alive… that his death was faked and the list of CIA agents found on his boat deliberately placed there to support a purge at CIA. You have no proof. Why can’t you accept the Police reports?’ This is a good ploy, since the dental records and autopsy report showing his body was two inches too long and the teeth weren’t his were lost right after his wife demanded inquiry, and since his body was cremated before she could view it — all that remains are the Police Reports. Handy.

Proper response: There is no suitable response to actual vanished materials or persons, unless you can shed light on the matter, particularly if you can tie the event to a cover up other criminality. However, with respect to dialog where it is used against the discussion, you can respond… ‘You are avoiding the issue with disinformation tactics. The best you can say is that the matter is in contention ONLY because of highly suspicious matters such as the simultaneous and mysterious vanishing of three sets of evidence. The suspicious nature itself tends to support the primary allegation. Why do you refuse to address the remaining issues by use of such disinformation tactics (rule 16 – vanish evidence and witnesses)?’

(17) Change the Subject

Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

Example: ‘There were no CIA drugs and was no drug money laundering through Mena, Arkansas, and certainly, there was no Bill Clinton knowledge of it because it simply didn’t happen. This is merely an attempt by his opponents to put Clinton off balance and at a disadvantage in the election: Dole is such a weak candidate with nothing to offer that they are desperate to come up with something to swing the polls. Dole simply has no real platform.’ Assistant’s response. ‘You idiot! Dole has the clearest vision of what’s wrong with Government since McGovern. Clinton is only interested in raping the economy, the environment, and every woman he can get his hands on…’ One naturally feels compelled, regardless of party of choice, to jump in defensively on that one…

Proper response: ‘You are both avoiding the issue with disinformation tactics. Your evade discussion of the issues by attempting to sidetrack us with an emotional response to a new topic — a trap which we will not fall into willingly. If you truly believe such political rhetoric, please drop out of this discussion, as it is not germane, and take it to one of the more appropriate politics NGs. Why do you refuse to address the issues by use of such disinformation tactics (rule 17- change the subject)?’

(18) Emotionalize, Antagonize, and Goad Opponents

If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

Example: ‘You are such an idiot to think that possible — or are you such a paranoid conspiracy buff that you think the ‘gubment’ is cooking your pea-brained skull with microwaves, which is the only justification you might have for dreaming up this drivel.’ After a drawing an emotional response: ‘Ohhh… I do seem to have touched a sensitive nerve. Tsk, tsk. What’s the matter? The truth too hot for you to handle? Perhaps you should stop relying on the Psychic Friends Network and see a psychiatrist for some real professional help…’

Proper response: ‘You are avoiding the issue with disinformation tactics. You attempt to draw me into emotional response without discussion of the issues. If you have something useful to contribute which defeats my argument, let’s here it — preferably without snide and unwarranted personal attacks, if you can manage to avoid sinking so low. Your useless rhetoric serves no purpose here if that is all you can manage. Why do you refuse to address the issues by use of such disinformation tactics (rule 18 – emotionalize, antagonize, and goad opponents)?’

(19) Ignore Proof Presented, Demand Impossible Proofs

This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

Example: ‘All he’s done is to quote the liberal media and a bunch of witnesses who aren’t qualified. Where’s his proof? Show me wreckage from flight 800 that shows a missile hit it!’

Proper response: ‘You are avoiding the issue with disinformation tactics. You presume for us not to accept Don Phillips, reporter for the Washington Post, Al Baker, Craig Gordon or Liam Pleven, reporters for Newsday, Matthew Purdy or Matthew L. Wald, Don Van Natta Jr., reporters for the New York Times, or Pat Milton, wire reporter for the Associated Press — as being able to tell us anything useful about the facts in this matter. Neither would you allow us to accept Robert E. Francis, Vice Chairman of the NTSB, Joseph Cantamessa Jr., Special Agent In Charge of the New York Office of the F.B.I., Dr. Charles Wetli, Suffolk County Medical Examiner, the Pathologist examining the bodies, nor unnamed Navy divers, crash investigators, or other cited officials, including Boeing Aircraft representatives a part of the crash investigative team — as a qualified party in this matter, and thus, dismisses this material out of hand. Good logic, — about as good as saying 150 eye witnesses aren’t qualified. Then you demand us to produce evidence which you know is not accessible to us, evidence held by FBI, whom we accuse of cover up. Thus, only YOU are qualified to tell us what to believe? Witnesses be damned? Radar tracks be damned? Satellite tracks be damned? Reporters be damned? Photographs be damned? Government statements be damned? Is there a pattern here?. Why do you refuse to address the issues by use of such disinformation tactics (rule 19 – ignore proof presented, demand impossible proofs)?’

(20) False Evidence

Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

Example: Jack Ruby warned the Warren Commission that the white Russian separatists, the Solidarists, were involved in the assassination. This was a handy ‘confession’, since Jack and Earl were both on the same team in terms of the cover up, and since it is now known that Jack worked directly with CIA in the assassination (see below.)

Proper response: This one can be difficult to respond to unless you see it clearly, such as in the following example, where more is known today than earlier in time… ‘You are avoiding the issue with disinformation tactics. Your information is known to have been designed to side track this issue. As revealed by CIA operative Marita Lorenz under oath offered in court in E. Howard Hunt vs. Liberty Lobby, CIA operatives E. Howard Hunt, James McCord, and others, met with Jack Ruby in Dallas the night before the assassination of JFK to distribute guns and money. Clearly, Ruby was a coconspirator whose ‘Solidarist confession’ was meant to sidetrack any serious investigation of the murder AWAY from CIA. Why do you refuse to address the issues by use of such disinformation tactics (rule 20 – false evidence)?’

(21) Call a Grand Jury, Special Prosecutor, or Other Empowered Investigative Body

Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

Example: According to one OK bombing Federal Grand Juror who violated the law to speak the truth, jurors were, contrary to law, denied the power of subpoena of witness of their choosing, denied the power of asking witnesses questions of their choosing, and relegated to hearing only evidence prosecution wished them to hear, evidence which clearly seemed fraudulent and intended to paint conclusions other than facts actually suggested.

Proper response: There is usually no adequate response to this tactic except to complain loudly at any sign of its application, particularly with respect to any possible cover up. This happened locally in Oklahoma, and as a result, a new Grand Jury has been called to rehear evidence that government officials knew in advance that the bombing was going to take place, and a number of new facts which indicate it was impossible for Timothy McVeigh to have done the deed without access to extremely advanced explosive devices such as available ONLY to the military or intelligence community, such as CIA’s METC technology. Media has refused to cover the new Oklahoma Grand Jury process, by they way.

(22) Manufacture a New Truth

Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

Example: The False Memory Syndrome Foundation and American Family Foundation and American and Canadian Psychiatric Associations fall into this category, as their founding members and/or leadership include key persons associated with CIA Mind Control research. Read The Professional Paranoid or Phsychic Dictatorship in the U.S.A. by Alex Constantine for more information. Not so curious, then, that (in a perhaps oversimplified explanation here) these organizations focus on, by means of their own “research findings”, that there is no such thing as Mind Control.

Proper response: Unless you are in a position to be well versed in the topic and know of the background and relationships involved in the opponent organization, you are not well equipped to fight this tactic.

(23) Create Bigger Distractions

If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

Example: To distract the public over the progress of a WTC bombing trial that seems to be uncovering nasty ties to the intelligence community, have an endless discussion of skaters whacking other skaters on the knee. To distract the public over the progress of the Waco trials that have the potential to reveal government sponsored murder, have an O.J. summer. To distract the public over an ever disintegrating McVeigh trial situation and the danger of exposing government involvements, come up with something else (Flight 800?) to talk about — or, keeping in the sports theme, how about sports fans shooting referees and players during a game and the focusing on the whole gun control thing?

Proper response: The best you can do is attempt to keep public debate and interest in the true issues alive and point out that the ‘news flap’ or other evasive tactic serves the interests of your opponents.

(24) Silence Critics

If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

Example: As experienced by certain proponents of friendly fire theories with respect to flight 800 — send in FBI agents to intimidate and threaten that if they persisted further they would be subject to charges of aiding and abetting Iranian terrorists, of failing to register as a foreign agents, or any other trumped up charges. If this doesn’t work, you can always plant drugs and bust them.

Proper response: You have three defensive alternatives if you think yourself potential victim of this ploy. One is to stand and fight regardless. Another is to create for yourself an insurance policy which will point to your opponents in the event of any unpleasantness, a matter which requires superior intelligence information on your opponents and great care in execution to avoid dangerous pitfalls (see The Professional Paranoid by this author for suggestions on how this might be done). The last alternative is to cave in or run (same thing.)

(25) Vanish

If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Example: Do a Robert Vesco and retire to the Caribbean. If you don’t, somebody in your organization may choose to vanish you the way of Vince Foster or Ron Brown.

Proper response: You will likely not have a means to attack this method, except to focus on the vanishing in hopes of uncovering it was by foul play or deceit as part of a deliberate cover up.

 

 
via

Apr 172017
 

Radical change in climatic conditions is melting Arctic ice and disrupting wildlife.

Global Warming Causing Melting Arctic Ice

The Arctic Ocean is warming up, icebergs are growing scarcer and in some places the seals are finding the water too hot, according to a report to the Commerce Department yesterday from Consulate at Bergen Norway.

Reports from fishermen, seal hunters and explorers all point to a radical change climate conditions and hitherto unheard-of temperatures in the Arctic zone.

Exploration expeditions report that scarcely any ice has been met as far north as 81 degrees 29 minutes.

Soundings to a depth of 3,100 meters showed the Gulf Stream still very warm.

Great masses of ice have been replaced by moraines of earth and stones, the report continued, while at many points well-known glaciers have entirely disappeared.

Very few seals and no white fish are found in the eastern Arctic, while vast shoals of herring and smelt which have never before ventured so far north, are being encountered in the old seal fishing grounds.

Within a few years it is predicted that due to the ice melt the sea will rise and make most coastal cities uninhabitable.


I must apologize.

I neglected to mention that this report was from November 2, 1922, as reported by the AP and published in The Washington Post – 94 years ago.

Global Warming? 1922

This must have been caused by the Model T Ford’s emissions or possibly from horse and cattle flatulence?

That article in turn was based on information relayed by the American consul in Norway to the U.S. State Department in October 1922 and published in the Monthly Weather Review:
mwr-050-11-0589a

 

 
via

Apr 132017
 

Who are the White Helmets? This is a question that everyone should be asking themselves.

Fact-Sheet On Syria’s White Helmets

The White Helmets – here are a few facts that you need to know. Share this with your family and friends who rely on the Western Mainstream Media:

 
• The White Helmets, also called Syria Civil Defence, are not who they claim to be. The group is not Syrian; it was created with USA/UK funding under the supervision of a British military contractor in 2013 in Turkey.

• The name “Syria Civil Defence” was stolen from the legitimate Syrian organization of the same name. The authentic Syria Civil Defence was founded in 1953 and is a founding member of the International Civil Defense Organization (1958).

• The name “White Helmets” was inappropriately taken from the legitimate Argentinian relief organization Cascos Blancos / White Helmets. In 2014, Cascos Blancos / White Helmets was honored at the United Nations for 20 years of international humanitarian assistance.

• The NATO White Helmets are primarily a media campaign to support the ‘regime change’ goals of the USA and allies. After being founded by security contractor James LeMesurier, the group was “branded” as the White Helmets in 2014 by a marketing company called “The Syria Campaign” managed out of New York by non-Syrians such as Anna Nolan. “The Syria Campaign” was itself “incubated” by another marketing company named “Purpose”.

• The White Helmets claim to be “neutral, impartial and humanitarian” and to “serve all the people of Syria” is untrue. In reality, they only work in areas controlled by the violent opposition, primarily terrorists associated with Nusra/AlQaeda (recently renamed Jabhat Fath al Sham).

• The White Helmets claim to be unarmed is untrue. There are photos which show their members carrying arms and celebrating Nusra/AlQaeda military victories.

• The White Helmets claim to be apolitical and non-aligned is untrue. In reality they actively promote and lobby for US/NATO intervention in violation of the norms of authentic humanitarian work.

• The Right Livelihood description that “Syria Civil Defence” saved over 60,000 people and “support in the provision of medical services to nearly 7 million people” is untrue. In reality the zones controlled by terrorists in Syria have few civilians remaining. That is why we see “cat” video/media stunts featuring the White Helmets.

• The NATO White Helmets actually undermine and detract from the work of authentic organizations such as the REAL Syria Civil Defence and Syrian Arab Red Crescent.

• The recent Netflix movie about the White Helmets is not a documentary; it is a self promotional advertisement. The directors never set foot in Syria. The Syrian video, real or staged, was provided by the White Helmets themselves. From the beginning scenes showing a White Helmet actor telling his little boy not to give mommy a hard time until the end, the video is contrived and manipulative. The video was produced by a commercial marketing company Violet Films/Ultra Violet Consulting which advertises its services as “social media management”, “crowd building” and “campaign implementation”.

The true face of the White Helmets:


 


 

References:

“Seven Steps of Highly Effective Manipulators” Origins of the White Helmets

http://dissidentvoice.org/2015/04/seven-steps-of-highly-effective-manipulators/

The REAL White Helmets awarded for 20 years work

http://cascosblancos.gob.ar/en/white-helmets-20-years-international-humanitarian-assistance-portrayed-un

The REAL Syria Civil Defence

http://www.globalresearch.ca/the-real-syria-civil-defence-exposes-natos-white-helmets-as-terrorist-linked-imposters/5547528

Who are the Syria White Helmets?

http://21stcenturywire.com/2016/06/21/who-are-the-syria-white-helmets/

White Helmets Deceive Right Livelihood and CodePink

http://truepublica.org.uk/global/white-helmets-deceive-right-livelihood-codepink/

White Helmets cat video showing terrorist zone with no civilians.  “The homeowners abandoned this district and its kittens.”  How fake does it get?

https://www.youtube.com/watch?v=UkfcE-Drnas

White Helmets are caught staging rescue only to claim they were making a mannequin challenge video.

http://archive.is/5D2Ew

 


 

 
via

Apr 122017
 

A CIA document from the early 1980s details a US plan to destroy Syria — in much the same way the United States has been doing for the last few years.

Declassified CIA Document Reveals Plan To Destroy Syria For Oil Pipeline

Geostrategically crucial Syria has been at the center of a decades-long plot by the United States to depose the sovereign government and install one supportive of goals in the Middle East must be revisited — and quickly — before the beating of war drums drowns out the truth of our government’s recently-espoused mission.

President Donald Trump has repeatedly castigated President Bashar al-Assad for ordering a gruesome mass killing of civilians with chemical weapons in Khan Sheikhoun. This accusation sparked a bolstering of support for the Syrian regime from both Moscow and Tehran.

“Syria at present has a hammerlock on US interests both in Lebanon and in the Gulf — through closure of Iraq’s pipeline thereby threatening Iraqi internationalization of the war. The US should consider sharply escalating the pressures against Assad through covertly orchestrating simultaneous military threats against Syria from three border states hostile to Syria: Iraq, Israel and Turkey.”

While the preceding bears the names of leaders and nations familiar to current headlines, that assessment, cogently titled, “Bringing Real Muscle to Bear Against Syria,” from former CIA officer Graham Fuller in actuality discusses Syria under Assad’s predecessor — his father, Hafez al-Assad — and is dated September 14, 1983, amid the Iran-Iraq War.

CIA-RDP88B00443R001404090133-0

 
Fuller’s analysis, points out Activist Post’s Brandon Turbeville, evinces Assad as a nuisance hindering American empire’s lust to control vast fossil fuel stores and protect ally, Israel, against multiple threats in the Middle East. Destabilization of Iraq and Iran also features prominently in the intricate U.S. plan to deal with the irritant, elder Assad — who, incidentally, recognized Western ulterior motives for what they were.

As the six-page document continues,

Syria continues to maintain a hammerlock on two key U.S. interests in the Middle East:

— Syrian refusal to withdraw its troops from Lebanon ensures Israeli occupation in the south;

— Syrian closure of the Iraqi pipeline has been a key factor in bringing Iraq to its financial knees, impelling it towards dangerous internationalization of the war in the Gulf.

Diplomatic initiatives to date have had little effect on Assad who has so far correctly calculated the play of forces in the area and concluded that they are only weakly arrayed against him. If the U.S. is to rein in Syria’s spoiling role, it can only do so through the exertion of real muscle which will pose a vital threat to Assad’s position and power.

CIA Document screen shot

With Iraq seeking to enjoin support internationally in the war, the U.S. had to scramble to prevent the shutdown of a pipeline — a dilemma Fuller suggests could be alleviated through a change in narrative to present Syria as a more deviant enemy than even Iran. That, alone, would have changed the face of the war bearing the names of the two principal adversaries — Sunni majority, Iraq, and Syria-allied, Shi’a, Iran.

Fuller asserted,

“The US should consider urging Iraq to take the war to the other key source of its predicament: Syria.”

Further, he continued,

“The US should consider sharply escalating the pressures against Assad [Sr.] through covertly orchestrating simultaneous military threats against Syria from three border states hostile to Syria: Iraq, Israel and Turkey. Iraq, perceived to be increasingly desperate in the Gulf war, would undertake limited military (air) operations against Syria with the sole goal of opening the pipeline. Although opening war on a second front against Syria poses considerable risk to Iraq, Syria would also face a two-front war since it is already heavily engaged in the Bekaa, on the Golan and in maintaining control over a hostile and restive population inside Syria.

“Israel would simultaneously raise tensions along Syria’s Lebanon front without actually going to war. Turkey, angered by Syrian support to Armenian terrorism, to Iraqi Kurds on Turkey’s Kurdish border areas and to Turkish terrorists operating out of northern Syria, has often considered launching unilateral military operations against terrorist camps in northern Syria. Virtually all Arab states would have sympathy for Iraq.

“Faced with three belligerent fronts, Assad would probably be forced to abandon his policy of closure of the pipeline. Such a concession would relieve the economic pressure on Iraq, and perhaps force Iran to reconsider bringing the war to an end. It would be a sharpening blow to Syria’s prestige and could effect the equation of forces in Lebanon.”

In context, then-President Ronald Reagan faced pressure both to insert military power in Lebanon — a theater of stated neutrality for the U.S. — and to prohibit actual military assistance in the fraught regional entanglement.

That is, until a suicide bomber decimated a U.S. Marines barracks encamped at an airport in Beirut, killing hundreds — just one month subsequent to the date on Fuller’s Syria action plan.

Micah Zenko, Senior Fellow at the Council on Foreign Relations — an albeit establishment- and Deep State-connected think tank — in “When America Attacked Syria,” wrote in 2012:

“The October 23, 1983, suicide truck bombing of the Marine barracks at the Beirut International Airport would kill 241 U.S. military personnel; simultaneously, another suicide bomber killed fifty-eight French servicemen of the MNF several kilometers away. (Two weeks later, yet another truck bomb exploded in the Israeli military headquarters in Tyre, killing sixty.) A FBI forensics assessment called the Marine barracks bombing the ‘biggest non-nuclear explosion since World War II.’ According to a Pentagon commission formed to investigate the attack, it was ‘tantamount to an act of war using the medium of terrorism.’ Within weeks, the CIA determined that ‘the bombings…of the United States and French MNF headquarters were carried out by Shia radicals, armed, trained, and directed by Syria and Iran.’”

That the CIA — master meddler in the affairs of sovereign nations — determined fault for the bombings rested with Syria and Iran left both plausibly responsible, with public perception largely following suit.

That a situation eerily similar — in behind-the-scenes string-pulling and long-term U.S. commitment to deposing an Assad from rule in Syria — appears to be playing out nearly three-and-a-half decades later, bellows resoundingly on failures of interventionist foreign policy.

Or, perhaps, its successes.

“Such a threat must be primarily military in nature. At present there are three relatively hostile elements around Syria’s borders: Israel, Iraq and Turkey. Consideration must be given to orchestrating a credible military threat against Syria in order to induce at least some moderate change in its policies,” Fuller explained in the document.

“This paper proposes serious examination of the use of all three states – acting independently – to exert the necessary threat. Use of any one state in isolation cannot create such a credible threat.”

Syria is now a landmine for the Trump administration — as it has been in varying intensity for a lengthy succession of presidents before.

 

 

 
via

Apr 122017
 

Everything You Ever Wanted to Know About The Order Of Skull And Bones, But Were Afraid to Ask

The Order Of Skull And Bones

The story begins at Yale, where three threads of American social history — espionage, drug smuggling and secret societies — intertwine into one. ParaScope is pleased to present this treatise on the Order of Skull and Bones, whose initiates fill the ranks of the global elite. Is Skull and Bones the American branch of the Illuminati? Are national and global events manipulated as part of a grand Hegellian equation, thesis and anti-thesis yielding a New World Order synthesis? The evidence and events surrounding the Order of Skull and Bones will shock you. Read on.

1. The Secret Origins of Skull & Bones

 
The Secret Origins of Skull & BonesThe story begins at Yale, where three threads of American social history — espionage, drug smuggling and secret societies — intertwine into one.

Elihu Yale was born near Boston, educated in London, and served with the British East India Company, eventually becoming governor of Fort Saint George, Madras, in 1687. He amassed a great fortune from trade and returned to England in 1699. Yale became known as quite a philanthropist; upon receiving a request from the Collegiate School in Connecticut, he sent a donation and a gift of books. After subsequent bequests, Cotton Mather suggested the school be named Yale College, in 1718.

A statue of Nathan Hale stands on Old Campus at Yale University. There is a copy of that statue in front of the CIA’s headquarters in Langley, Virginia. Yet another stands in front of Phillips Academy in Andover, Massachusetts (where George H.W. Bush (’48) went to prep school and joined a secret society at age twelve).

Nathan Hale, along with three other Yale graduates, was a member of the “Culper Ring,” one of America’s first intelligence operations. Established by George Washington, it was successful throughout the Revolutionary War. Nathan was the only operative to be ferreted out by the British, and after speaking his famous regrets, he was hanged in 1776. Ever since the founding of the Republic, the relationship between Yale and the “Intelligence Community” has been unique.

In 1823, Samuel Russell established Russell and Company for the purpose of acquiring opium in Turkey and smuggling it to China. Russell and Company merged with the Perkins (Boston) syndicate in 1830 and became the primary American opium smuggler. Many of the great American and European fortunes were built on the “China”(opium) trade.

One of Russell and Company’s Chief of Operations in Canton was Warren Delano, Jr., grandfather of Franklin Roosevelt. Other Russell partners included John Cleve Green (who financed Princeton), Abiel Low (who financed construction of Columbia), Joseph Coolidge and the Perkins, Sturgis and Forbes families. (Coolidge’s son organized the United Fruit company, and his grandson, Archibald C. Coolidge, was a co-founder of the Council on Foreign Relations.)

William Huntington Russell (’33), Samuel’s cousin, studied in Germany from 1831-32. Germany was a hotbed of new ideas. The “scientific method” was being applied to all forms of human endeavor. Prussia, which blamed the defeat of its forces by Napoleon in 1806 on soldiers only thinking about themselves in the stress of battle, took the principles set forth by John Locke and Jean Rosseau and created a new educational system. Johan Fitche, in his “Address to the German People,” declared that the children would be taken over by the State and told what to think and how to think it.

Georg Wilhelm Friedrich Hegel took over Fitche’s chair at the University Of Berlin in 1817, and was a professor there until his death in 1831. Hegel was the culmination of the German idealistic philosophy school of Immanuel Kant.

To Hegel, our world is a world of reason. The state is Absolute Reason and the citizen can only become free by worship and obedience to the state. Hegel called the state the “march of God in the world” and the “final end”. This final end, Hegel said, “has supreme right against the individual, whose supreme duty is to be a member of the state.” Both fascism and communism have their philosophical roots in Hegellianism. Hegellian philosophy was very much in vogue during William Russell’s time in Germany.

When Russell returned to Yale in 1832, he formed a senior society with Alphonso Taft (’33). According to information acquired from a break-in to the “tomb” (the Skull and Bones meeting hall) in 1876, “Bones is a chapter of a corps in a German University…. General Russell, its founder, was in Germany before his Senior Year and formed a warm friendship with a leading member of a German society. He brought back with him to college, authority to found a chapter here.” So class valedictorian William H. Russell, along with fourteen others, became the founding members of “The Order of Scull and Bones,” later changed to “The Order of Skull and Bones”.

The secretive Order of Skull and Bones exists only at Yale. Fifteen juniors are “tapped” each year by the seniors to be initiated into next year’s group. Some say each initiate is given $15,000 and a grandfather clock. Far from being a campus fun-house, the group is geared more toward the success of its members in the post-collegiate world.

The family names on the Skull and Bones roster roll off the tongue like an elite party list — Lord, Whitney, Taft, Jay, Bundy, Harriman, Weyerhaeuser, Pinchot, Rockefeller, Goodyear, Sloane, Stimson, Phelps, Perkins, Pillsbury, Kellogg, Vanderbilt, Bush, Lovett and so on.

William Russell went on to become a general and a state legislator in Connecticut. Alphonso Taft was appointed U.S. Attorney General, Secretary of War (a post many “Bonesmen” have held), Ambassador to Austria, and Ambassador to Russia (another post held by many “Bonesmen”). His son, William Howard Taft (’87), is the only man to be both President of the United States and Chief Justice of the Supreme Court.

2. Secrets of the “Tomb”

 
The Secret Origins of Skull & BonesThe Order flourished from the very beginning in spite of occasional squalls of controversy. There was dissension from some professors, who didn’t like its secrecy and exclusiveness. And there was backlash from students, showing concern about the influence “Bones” was having over Yale finances and the favoritism shown to “Bonesmen.”

In October of 1873, Volume 1, Number 1, of The Iconoclast was published in New Haven. It was only published once and was one of very few openly published articles on the Order of Skull and Bones.

From The Iconoclast:

“We speak through a new publication. because the college press is closed to those who dare to openly mention ‘Bones’….

“Out of every class Skull and Bones takes its men. They have gone out into the world and have become, in many instances, leaders in society. They have obtained control of Yale. Its business is performed by them. Money paid to the college must pass into their hands, and be subject to their will. No doubt they are worthy men in themselves, but the many, whom they looked down upon while in college, cannot so far forget as to give money freely into their hands. Men in Wall Street complain that the college comes straight to them for help, instead of asking each graduate for his share. The reason is found in a remark made by one of Yale’s and America’s first men: ‘Few will give but Bones men and they care far more for their society than they do for the college….’

“Year by year the deadly evil is growing. The society was never as obnoxious to the college as it is today, and it is just this ill-feeling that shuts the pockets of non-members. Never before has it shown such arrogance and self-fancied superiority. It grasps the College Press and endeavors to rule it all. It does not deign to show its credentials, but clutches at power with the silence of conscious guilt.

“To tell the good which Yale College has done would be well nigh impossible. To tell the good she might do would be yet more difficult. The question, then, is reduced to this — on the one hand lies a source of incalculable good — on the other a society guilty of serious and far-reaching crimes. It is Yale College against Skull and Bones!! We ask all men, as a question of right, which should be allowed to live?”

At first, the society held its meetings in hired halls. Then in 1856, the “tomb”, a vine-covered, windowless, brown-stone hall was constructed, where to this day the “Bonesmen” hold their “strange, occultish” initiation rites and meet each Thursday and Sunday.

On September 29, 1876, a group calling itself “The Order of File and Claw” broke into the Skull and Bones’ holy of holies. In the “tomb” they found lodge-room 324 “fitted up in black velvet, even the walls being covered with the material.” Upstairs was lodge-room 322, “the ‘sanctum sanctorium’ of the temple… furnished in red velvet” with a pentagram on the wall. In the hall are “pictures of the founders of Bones at Yale, and of members of the Society in Germany, when the chapter was established here in 1832.” The raiding party found another interesting scene in the parlor next to room 322.

From “The Fall Of Skull And Bones”:

“On the west wall, hung among other pictures, an old engraving representing an open burial vault, in which, on a stone slab, rest four human skulls, grouped about a fools cap and bells, an open book, several mathematical instruments, a beggar’s scrip, and a royal crown. On the arched wall above the vault are the explanatory words, in Roman letters, ‘We War Der Thor, Wer Weiser, Wer Bettler Oder, Kaiser?’ and below the vault is engraved, in German characters, the sentence; ‘Ob Arm, Ob Beich, im Tode gleich.’

The picture is accompanied by a card on which is written, ‘From the German Chapter. Presented by D. C. Gilman of D. 50’.”

Daniel Coit Gilman (’52), along with two other “Bonesmen,” formed a troika which still influences American life today. Soon after their initiation in Skull and Bones, Daniel Gilman, Timothy Dwight (’49) and Andrew Dickinson White (’53) went to study philosophy in Europe at the University of Berlin. Gilman returned from Europe and incorporated Skull and Bones as Russell Trust, in 1856, with himself as Treasurer and William H. Russell as President. He spent the next fourteen years in New Haven consolidating the order’s power.

Gilman was appointed Librarian at Yale in 1858. Through shrewd political maneuvering, he acquired funding for Yale’s science departments (Sheffield Scientific School) and was able to get the Morrill Land Bill introduced in Congress, passed and finally signed by President Lincoln, after being vetoed by President Buchanan.

This bill, “donating public-lands for State College for agriculture and sciences”, is now known as the Land Grant College Act. Yale was the first school in America to get the federal land scrip and quickly grabbed all of Connecticut’s share at the time. Pleased by the acquisitions, Yale made Gilman a Professor of Physical Geography.

Daniel was the first President of the University of California. He also helped found, and was the first president of, John Hopkins.

Gilman was first president of the Carnegie Institution and involved in the founding of the Peabody, Slater and Russell Sage Foundations.

His buddy, Andrew D. White, was the first president of Cornell University (which received all of New York’s share of the Land Grant College Act), U.S. Minister to Russia, U.S. Ambassador to Berlin and first president of the American Historical Association. White was also Chairman of the American delegation to the first Hague Conference in 1899, which established an international judiciary.

Timothy Dwight, a professor at Yale Divinity School, was installed as president of Yale in 1886. All presidents since, have been either “Bonesmen” or directly tied to the Order and its interests.

The Daniel/Gilman/White trio was also responsible for the founding of the American Economic Association, the American Chemical Society and the American Psychological Association. Through their influences on John Dewey and Horace Mann, this trio continues to have an enormous impact on education today.

3. Networks of Power

 
The Secret Origins of Skull & BonesIn his book “America’s Secret Establishment,” Antony Sutton outlined the Order of Skull and Bones’ ability to establish vertical and horizontal “chains of influence” that ensured the continuity of their conspiratorial schemes.

The Whitney-Stimson-Bundy links represent the “vertical chain”.

W. C. Whitney (’63), who married Flora Payne (of the Standard Oil Payne dynasty), was Secretary of the Navy. His attorney was a man named Elihu Root. Root hired Henry Stimson (’88), out of law school. Stimson took over from Root as Secretary of War in 1911, appointed by fellow Bonesman William Howard Taft. Stimson later became Coolidge’s Governor-General of the Philippine Islands, Hoover’s Secretary of State, and Secretary of War during the Roosevelt and Truman administrations.

Hollister Bundy (’09) was Stimson’s special assistant and point man in the Pentagon for the Manhattan Project. His two sons, also members of Skull and Bones, were William Bundy (’39) and McGeorge Bundy (’40) — both very active in governmental and foundation affairs.

The two brothers, from their positions in the CIA, the Department of Defense and the State Department, and as Special Assistants to Presidents Kennedy and Johnson, exercised significant impact on the flow of information and intelligence during the Vietnam “War.”

William Bundy went on to be editor of Foreign Affairs, the influential quarterly of the Council on Foreign Affairs (CFR). McGeorge became president of the Ford Foundation.

Another interesting group of “Bonesmen” is the Harriman/Bush crowd. Averil Harriman (’13), “Elder Statesman” of the Democratic Party, and his brother Roland Harriman (’17) were very active members. In fact, four of Roland’s fellow “Bonesmen” from the class of 1917 were directors of Brown Brothers, Harriman, including Prescott Bush (’17), George Bush’s dad.

Since the turn of the century, two investment bank firms — Guaranty Trust and Brown Brothers, Harriman — were both dominated by members of Skull and Bones. These two firms were heavily involved in the financing of Communism and Hitler’s regime.

Bonesman share an affinity for the Hegellian ideas of the historical dialectic, which dictates the use of controlled conflict — thesis versus anti-thesis — to create a pre-determined synthesis. A synthesis of their making and design, where the state is absolute and individuals are granted their freedoms based on their obedience to the state — a New World Order.

Funding and political maneuvering on the part of “Bonesmen” and their allies helped the Bolsheviks prevail in Russia. In defiance of federal laws, the cabal financed industries, established banks and developed oil and mineral deposits in the fledgling U.S.S.R.

Later, Averil Harriman, as minister to Great Britain in charge of Lend-Lease for Britain and Russia, was responsible for shipping entire factories into Russia. According to some researchers, Harriman also oversaw the transfer of nuclear secrets, plutonium and U. S. dollar printing plates to the U.S.S.R.

In 1932, the Union Banking Corporation of New York City had enlisted four directors from the (’17) cell and two Nazi bankers associated with Fritz Thyssen, who had been financing Hitler since 1924.

From “George Bush; The Unauthorized Biography”:

“President Franklin Roosevelt’s Alien Property Custodian, Leo T. Crowley, signed Vesting Order Number 248 [11/17/42] seizing the property of Prescott Bush under the Trading with Enemy Act. The order, published in obscure government record books and kept out of the news, Note #4 explained nothing about the Nazis involved; only that the Union Banking Corporation was run for the ‘Thyssen family’ of ‘Germany and/or Hungary’ — ‘nationals … of a designated enemy country.’

“By deciding that Prescott Bush and the other directors of the Union Banking Corporation were legally ‘front men for the Nazis’, the government avoided the more important historical issue: In what way ‘were Hitler’s Nazis themselves hired, armed, and instructed by’ the New York and London clique of which Prescott Bush was an executive manager? …

“4. New York Times, December 16, 1944, ran a five-paragraph page 25 article on actions of the New York State Banking Department. Only the last sentence refers to the Nazi bank, as follows: ‘The Union Banking Corporation, 39 Broadway, New York, has received authority to change its principal place of business to 120 Broadway.’

“The Times omitted the fact that the Union Banking Corporation had been seized by the government for trading with the enemy, and the fact that 120 Broadway was the address of the government’s Alien Property Custodian.”

After the war, Prescott went on to become a U. S. Senator from Connecticut and favorite golfing partner of President Eisenhower. Prescott claims responsibility for getting Nixon into politics and takes personal credit for bringing Dick on board as Ike’s running mate in 1952.

4. Name Roster of the Secret Establishment

 
The Secret Origins of Skull & BonesThere were so many “Yalies” in the OSS that Yale’s drinking tune, the “Whiffenpoof Song”, became an “unofficial” song of the OSS. Many in the OSS were “Bonesmen” or belonged to the other Yale senior societies.

Robert Lovett (’18), Harriman’s childhood friend, had been tapped into Skull & Bones by Prescott Bush’s cell of ’17 and was a director at Brown Brothers, Harriman.

Again, from “George Bush: The Unauthorized Biography”:

“On October 22, 1945, Secretary of War Robert Patterson created the Lovett Committee, chaired by Robert A. Lovett, to advise the government on the post-World War II organization of U.S. intelligence activities…. The new agency would ‘consult’ with the armed forces, but it must be the sole collecting agency in the field of foreign espionage and counterespionage. The new agency should have an independent budget, and its appropriations should be granted by Congress without public hearings. Lovett appeared before the Secretaries of State, War, and Navy on November 14, 1945…. Lovett pressed for a virtual resumption of the wartime Office of Strategic Services (OSS)…. The CIA was established in 1947 according to the prescription of Robert Lovett, of Jupiter Island.”

Gaddis Smith, a history professor at Yale, said, “Yale has influenced the Central Intelligence Agency more than any other university, giving the CIA the atmosphere of a class reunion.” And “Bonesman” have been foremost among the “spooks” building the CIA’s “haunted house.”

F. Trubee Davison (’18) was Director of Personnel at the CIA in the early years. Some of the other “Bonesmen” connected with the intelligence community are:

  • Sloane Coffin, Jr. (’49)
  • V. Van Dine (’49)
  • James Buckley (’44)
  • Bill Buckley (’50)
  • Hugh Cunnigham (’34)
  • Hugh Wilson (’09)
  • Reuben Holden (’40)
  • Charles R. Walker (’16)
  • Yale’s ‘unofficial’ Secretary of War, Robert D. French (’10)
  • Archibald MacLiesh (’15)
  • Dino Pionzio (’50), CIA Deputy Chief of Station during Allende overthrow
  • William and McGeorge Bundy
  • Richard A. Moore (‘3?)
  • Senator David Boren (’63)
  • Senator John Kerry (’66)

…and, of course, George Herbert Walker Bush. Bush tapped Coffin, who tapped Buckley.

Some other prominent Bonesmen include:

  • Henry Luce (’20), Time-Life
  • John Thomas Daniels (’14), founder Archer Daniels Midland
  • Gifford Pinchot (’89), President Theodore Roosevelt’s chief forester
  • Frederick E. Weyerhaeuser (’96)
  • Harold Stanley (’08), founder of Morgan Stanley, investment banker
  • Alfred Cowles (’13), Cowles Communication
  • Henry P. Davison (’20), senior partner Morgan Guaranty Trust
  • Thomas Cochran (’04) Morgan partner
  • Senator John Heinz (’31)
  • Pierre Jay (’92), first chairman of the Federal Reserve Bank of New York
  • George Herbert Walker, Jr. (’27), financier and co-founder of the NY Mets
  • Artemus Gates (’18), President of New York Trust Company, Union Pacific, TIME, Boeing Company
  • William Draper III (50), the Defense Department, UN and Import-Export Bank
  • Dean Witter, Jr.(’44), investment banker
  • Senator Jonathan Bingham (’36)
  • Potter Stewart (’36), Supreme Court Justice
  • Senator John Chaffe (’47)
  • Harry Payne Whitney (’94), husband of Gertrude Vanderbilt, investment banker
  • Russell W. Davenport (’23), editor Fortune Magazine, created Fortune 500 list
  • Evan G. Galbraith (’50), Ambassador to France and Managing Director of Morgan Stanley
  • Richard Gow (’55), president Zapata Oil
  • Amory Howe Bradford (’34), husband of Carol Warburg Rothschild and general manager for the New York Times
  • C. E. Lord (’49), Comptroller of the Currency
  • Winston Lord (’59), Chairman of CFR, Ambassador to China and assistant Secretary of State in the Clinton administration

Ever since Nixon re-established America’s political relationship with China, many of our ambassadors to that country have been Bonesmen, including George Bush, the first Chief U. S. Liaison Officer to the Peoples Republic of China.

5. China and the Opium Wars

 
The Secret Origins of Skull & BonesWhy all this interest in China? Well, China, among other things, is one of the largest producers and users of opiates in the world.

For a while, in the 1800s, the Yankee Clippers in Connecticut and Massachusetts were the fastest ships on the ocean. Speed was crucial to the opium trade; whoever made the trip from Turkey/India to Macao/Hong Kong/Shanghai first got the most for their goods.

During the Opium Wars, the U.S. chose to stand on the sidelines and cheer for the English and French, knowing that treaty obligations would bring the U.S. a share in the spoils. Russell and Company was at times the only trading house operating in Canton and used the opportunity to developed strong commercial ties and handsome profits.

Powerful national interests were behind the drug trade, because American traders were badly in need of some article the Chinese would buy, since by this time the seal breeding grounds had been nearly wiped out. If the Chinese had not bought opium from Americans, then United States imports of silk, porcelain and tea would have to paid in precious coin, which was in short supply. In 1843, when the Port of Shanghai was opened, Russell and Co. was one of its earliest traders.

In 1903, Yale Divinity School set up a program of schools and hospitals in China. Mao Zedong was among the staff. During the intrigues of China in the 1930s and ’40s, American intelligence called upon the resources of “Yale in China”, and George Bush’s cousin and fellow “Bonesman” Reuben Holden.

After stints as UN Ambassador and Chairman of the Republican National Committee for the beleaguered Richard Nixon, George Bush was sent to look after the “China trade”. The Bush family is still very much involved in the economic activities of “Red” China.

Many researchers contend that George Bush has been with CIA since the early 1950s, and that one of his jobs was to consolidate and co-ordinate the worldwide narcotics industry, the largest industry on Earth. Some say that one of the reasons behind the Vietnam “Police Action” was a cover for the consolidation of the “Golden Triangle”.

6. The War on Drugs: An “Intellectual Fraud”

 
The Secret Origins of Skull & BonesBefore the Vietnam “War”, the Golden Triangle was run by French Intelligence and Corsican mobsters. After the French bailed out and America moved in, the triangle was run by U.S. intelligence, with aid from Sicilian mobsters. This narcotics network is well documented in “The Politics of Heroin in S. E. Asia” by Alfred McCoy, “The Great Heroin Coup” by Henrik Kruger and “Double-Cross” by Sam and Chuck Giancana.

Vice-President George Bush, as Chairman of President Reagan’s cabinet-level working group and as Director of the National Narcotics Interdiction System, was the highest U. S. governmental official involved in the “war on drugs”.

Frances Mullen, Jr., former head of the Drug Enforcement Agency (DEA), called Bush’s efforts “an intellectual fraud” and “a liability rather than an asset”. Soon after these statements, Mullen resigned and the resultant General Accounting Office (GAO) report was buried.

In July, 1985, the suppressed GAO paper reported that there were “no benefits from the National Narcotics Border Interdiction System, directed by George Bush. In fact, the overall effect was to encourage supply….”

Monika Jensen-Stevenson, a “60 Minutes” producer, quit her job after the CBS news program refused to air the story she had uncovered relating to the covert drug trade. Her book, “Kiss The Boys Goodbye”, details how our intelligence community used the apparatus of the POW/MIA governmental agencies as a cover for the trafficking of opiates from the “Golden Triangle”.

President Reagan appointed Reform Party founder and Texas billionaire Ross Perot to the President’s Advisory Council on Foreign Intelligence. Reagan made Perot a special presidential investigator, looking into America’s POW and MIAs from the Vietnam “War”.

Ross took the job to heart and spent considerable time and money in pursuit of the quest. He was given special clearance and access. He asked questions and interviewed everyone he could find.

From “Kiss The Boys Goodbye”:

“Relations between Bush and Perot had gone downhill ever since the Vice-President had asked Ross Perot how his POW/MIA investigations were going.

‘Well, George, I go in looking for prisoners,’ said Perot, ‘but I spend all my time discovering the government has been moving drugs around the world and is involved in illegal arms deals…. I can’t get at the prisoners because of the corruption among our own people.’

“This ended Perot’s official access to the highly classified files as a one-man presidential investigator. ‘I have been instructed to cease and desist,’ he had informed the families of missing men early in 1987.”

The wholesale importation of cocaine into the U.S. during “Iran/Contra” is also well documented. George Bush, is known “to be in the loop” with many of the players keeping in contact directly with his office.

Also, there has been much speculation as to the use of the off-shore rigs, pipelines and other assets of Zapata Offshore being used for narcotic trans-shipments.

Narcotics such as cocaine and heroin cannot be manufactured without the precursor chemicals. One of the largest makers of these precursor chemicals is the Eli Lilly Company of Indianapolis, Indiana. The Quayle family is a large stockholder, and George Bush has been on the Board of Directors. Eli Lilly is also the company that first synthesized LSD for the CIA.

7. George Bush, Skull & Bones and the JFK Assassination

 
The Secret Origins of Skull & BonesRodney Stich’s book “Defrauding America” tells of a “deep-cover CIA officer” assigned to a counter-intelligence unit, code-named Pegasus. This unit “had tape-recordings of plans to assassinate Kennedy” from a tap on the phone of J. Edgar Hoover. The people on the tapes were “[Nelson] Rockefeller, Allen Dulles, [Lyndon] Johnson of Texas, George Bush and J. Edgar Hoover.”

Could George Bush be involved in the JFK assassination?

In 1963, Bush was living in Houston, busily carrying out his duties as president of the Zapata Offshore oil company. He denied the existence of a note sent by the FBI’s J. Edgar Hoover to “Mr. George Bush of the CIA.” When news of the note surfaced, the CIA first said they never commented on employment questions, but later relented said yes, a “George Bush” was mentioned in the note, but that it was “another” George Bush, not the man who took office in the White House in 1988.

Some intrepid reporters tracked down the “other” George Bush and discovered that he was just a lowly clerk who had shuffled papers for the CIA for about six months. He never received any interagency messages from anybody at the FBI, let alone the Queen Mary.

It is also worth noting that a CIA code word for Bay of Pigs was Operation Zapata, and that two of the support vessels were named Barbara and Houston.

Many say that George Bush was high up on the CIA ladder at the time, running proprietorial vehicles and placed in a position of command, responsible for many of the Cubans recruited into “service” at the time. All through the Iran-Contra affair, Felix Rodriguez, the man who captured and had Che Guevara killed for the CIA, always seemed to call Bush’s office first.

From The Realist (Summer, 1991):

“Bush was working with the now-famous CIA agent, Felix Rodriguez, recruiting right-wing Cuban exiles for the invasion of Cuba. It was Bush’s CIA job to organize the Cuban community in Miami for the invasion…. A newly discovered FBI document reveals that George Bush was directly involved in the 1963 murder of President John Kennedy. The document places marksmen by the CIA. Bush at that time lived in Texas. Hopping from Houston to Miami weekly, Bush spent 1960 and ’61 recruiting Cubans in Miami for the invasion….

“George Bush claims he never worked for the CIA until he was appointed Director by former Warren Commission director and then president Jerry Ford in 1976. Logic suggests that is highly unlikely. Of course, Bush has a company duty to deny being in the CIA. The CIA is a secret organization. No one ever admits to being a member. The truth is that Bush has been a top CIA official since before the 1961 invasion of Cuba, working with Felix Rodriguez. Bush may deny his actual role in the CIA in 1959, but there are records in the Bay of Pigs invasion of Cuba that expose Bush’s role…”

On the Watergate tapes, June 23, 1972, referred to in the media as the ‘smoking gun’ conversation, Nixon and his Chief of Staff, H.R. Haldeman, were discussing how to stop the FBI investigation into the CIA Watergate burglary. They were worried that the investigation would expose their connection to ‘the Bay of Pigs thing.’ Haldeman, in his book “The Ends of Power”, reveals that Nixon always used code words when talking about the 1963 murder of JFK. Haldeman said Nixon would always refer to the assassination as ‘the Bay of Pigs’.

On that transcript we find Nixon discussing the role of George Bush’s partner, Robert Mosbacher, as one of the Texas fundraisers for Nixon. On the tapes Nixon keeps referring to the ‘Cubans’ and the ‘Texans.’ The ‘Texans’ were Bush, Mosbacher and Baker. This is another direct link between Bush and evidence linking Nixon and Bush to the Kennedy assassination.”

8. Motives for the Conspiracy

 
The Secret Origins of Skull & BonesSo, why would an intelligence agency/secret society want to smuggle drugs and assassinate JFK?

Well, they make a lot of money, and they garner intelligence assets through their participation. There’s also the rationale that the world is a seamy and unseemly place, and if you’re going to be the ‘big boy’ on the block, you better know what’s going on. And what better way of knowing than by running it yourself? There are also some who theorize that the covert drug trade fits with plans to destabilize American families and society. Through demoralizing and fracturing the body politic, they can impose their will using psychological warfare and the political alchemy of the Hegellian dialectic.

James Shelby Downard’s article, “Sorcery, Sex, Assassination and the Science of Symbolism ,” an underground classic, links American historical events with a wild, numerological, grand occult plan “to turn us into cybernetic mystery zombies”. The assassination of JFK, this article contends, was the performance of a public occult ritual called The Killing of the King, designed as a mass-trauma, mind-control assault against our U.S. national body-politic.

During Operation Sunrise, Operation Blowback, Operation Paperclip and others, thousands of Nazi scientists, researchers and administrators were brought to the United States after World War II. Many were “smuggled” into the country against direct, written, orders from President Harry S. Truman.

Project Monarch was the resumption of a mind-control project called Marionette Programming, which started in Nazi Germany. The basic component of the Monarch Program is the sophisticated manipulation of the mind, using extreme trauma to induce Multiple Personality Disorder.

Mr. Downward feels that the perpetrators purposefully murdered JFK in such a way as to affect our National identity and cohesiveness — to fracture America’s soul. Even the blatancy of their conspiracy was designed to show “their superiority” and “our futility”.

There have been studies that show a correlation between the JFK assassination and the rise in violence in society, distrust of government and other extensions of social ills.

9. The Illuminati: Subverting the Body Politic

 
The Secret Origins of Skull & BonesWhy this attack against our body politic?

In 1785, a bolt of lightning struck a courier en route to Paris from Frankfort-on-the-Main. A tract written by Adam Weishaupt, founder of the Illuminati, “Original Shift in Days of Illuminations,” was recovered from the dead messenger, containing the secret society’s long-range plan for “The New World Order through world revolution”.

The Bavarian Government outlawed the society and in 1787 published the details of The Illuminati conspiracy in “The Original Writings of the Order and Sect of the Illuminati.”

In Adam Weishaupt’s own words:

“By this plan, we shall direct all mankind in this manner. And, by the simplest means, we shall set all in motion and in flames. The occupations must be so allotted and contrived that we may, in secret, influence all political transactions.”

There is disagreement among scholars as to whether or not the Illuminati survived its banishment. Nevertheless, the group had been quite successful in attracting members and had allied itself with the extensive Masonic networks.

The Illuminati was publicly founded May 1, 1776 at the University of Ingolstadt by Weishaupt, Professor of Canon Law. It was a very “learned” society; Weishaupt drew the earliest members of his new order from among his students.

On December 5, 1776, students at William and Mary College founded a secret society, Phi Beta Kappa. A second chapter was formed, at Yale, in 1780. The anti-Masonic movement in the United States during the 1820s held groups such as Phi Beta Kappa in a bad light. Because of pressure, the society went public. This is noted by some researchers as the direct cause of the appearance of Yale’s Order of Skull and Bones.

In “The Cyclopedia Of Fraternities”, a genealogical chart of general Greek-Letter college fraternities in the United States, shows Phi Beta Kappa as “the parent of all the fraternal systems in [American] higher education.” There is only one “side” lineal descendant: the Yale chapter of 1780. The line then continues to Skull and Bones in 1832, and on through the other “only at Yale” senior societies, Scroll & Key and Wolf’s Head.

Phi Beta Kappa is the “first three Greek letters, for ‘Philosophia Biou Kubernetes’ or ‘Love of wisdom, the helmsman of life’.” A skull homophone is scull, a quick, gliding boat and part of Skull & Bones first nomenclature.

John Robison, a professor of natural philosophy at Edinburgh University in Scotland and a member of a Freemason Lodge, said that he was asked to join the Illuminati. After study, he concluded the purposes of the Illuminati were not for him.

In 1798, he published a book called “Proofs Of A Conspiracy”:

“An association has been formed for the express purpose of rooting out all the religious establishments and overturning all the existing governments…. the leaders would rule the World with uncontrollable power, while all the rest would be employed as tools of the ambition of their unknown superiors.”

“Proofs of A Conspiracy” was sent to George Washington. Responding to the sender of the book with a letter, the president said he was aware the Illuminati were in America. He felt that the Illuminati had “diabolical tenets” and that their object was “a separation of the People from their government.”

In “Proofs Of A Conspiracy”, Robison printed the ceremony of initiation of the “Regent degree” in Illuminism. In it “a skeleton is pointed out to him [the initiate], at the feet of which are laid a crown and a sword. He is asked ‘whether that is the skeleton of a king, nobleman or a beggar.’ As he cannot decide, the president of the meeting says to him, ‘The character of being a man is the only one that is importance'”.

This is, essentially, the same as the writing in the Skull & Bones “tomb”:

“Wer war der Thor, wer Weiser, Bettler oder Kaiser? Ob Arm, ob Reich, im Tode gleich.”

Which reads:

“Who was the fool, who the wise man, beggar or king? Whether poor or rich, all’s the same in death.”

10. Skull & Bones = Illuminati?

 
The Secret Origins of Skull & BonesIs the Order of the Skull & Bones part of the Illuminati?

When a person is initiated into Skull & Bones, they are given a new name, similar to the practice of the Illuminati. And many recorded Illuminati members can be shown to have contact and/or strong influences with many of the professors that taught “Bonesmen” in Berlin.

When a secret society conspires against the sovereignty of a king, they need to organize, raise funds, make their plans operational, and hopefully bring them to fruition.

Could we have in the United States a secret society that has used the “National Security State” as a cover for their nefarious plans?

From “George Bush: The Unauthorized Biography”:

“That September [1951], Robert Lovett replaced Marshall as secretary of defense. Meanwhile, Harriman was named director of the Mutual Security Agency, making him the U.S. chief of the Anglo-American military alliance. By now, Brown Brothers, Harriman was everything but commander-in-chief.

“A central focus of the Harriman security regime in Washington (1950-53) was the organization of covert operations and ‘psychological warfare.’ Harriman, together with his lawyers and business partners, Allen and John Foster Dulles, wanted the government’s secret services to conduct extensive propaganda campaigns and mass-psychology experiments within the U.S.A., and paramilitary campaigns abroad….

“The Harriman security regime created the Psychological Strategy Board (PSB) in 1951. The man appointed director of the PSB [was] Gordon Gray…. Gordon’s brother, R.J. Reynolds chairman Bowman Gray Jr., was also a naval intelligence officer, known around Washington as the ‘founder of operational intelligence.’ Gordon Gray became a close friend and political ally of Prescott Bush; and Gray’s son became for Prescott’s son, George, his lawyer and the shield of his covert policy.”

So you have the Whitney/Stimson/Bundy clan and the Harriman/Bush boys wielding a tremendous amount of influence on the political, economic and social affairs of America and the world. Then you have Prescott Bush’s buddy Richard Nixon as an activist vice-president. Then, a nation-chilling assassination, some time under LBJ with the Bundy boys keeping things in line, then Nixon as President with “Bonesmen” aides Ray Price (’51) and Richard A. Moore. Some time out for a Trilateralist-Democrat-patsy president, followed by Prescott’s son as an activist vice-president under Reagan. Next, we get a Skull and Bones president who declares a “New World Order” while beating up on his business partner, Saddam Hussein.

After twelve years of Republican administrations, Bush passes the reins to his drug smuggling buddy from Arkansas, Bill Clinton, who studied at Yale Law School. According to some researchers, Clinton was recruited as a CIA operative while a Rhodes Scholar at Oxford. Could this be the “old Hegallian historical dialectic process”?

11. World History: Plan or Accident?

 
The Secret Origins of Skull & BonesWill we get another failed Democratic administration? A scandal as disgraceful as Nixon’s fall? When Robert P. Johnson (William Barr) told Clinton in a bunker in Arkansas that “you are our fair-haired boy, but you do have competition for the job you seek. We would never put all our eggs in one basket. You and your state have been our greatest asset…. Mr. Casey wanted me to pass on to you, that unless you fuck up and do something stupid, you are number one on our short list for shot at the job you always wanted.”

So, you have William Casey — CIA Director, George Bush’s campaign manager and Sovereign Knight of Malta — speaking through the proxy of George Bush’s last Attorney General to George’s rival in the 1992 federal elections. Is it all just a show and sham for U.S. hoi polloi?

Perhaps so, if there exists the type of control over the electoral process as told by Mae Brussell and the suppressed book “VoteScam,” written by Jim and Ken Collier:

“…Your vote and mine may now be a meaningless bit of energy directed by preprogrammed computers-which can be fixed to select certain pre-ordained candidates and leave no footprints or paper trail.

“In short, computers are covertly stealing your vote.

“–For almost three decades the American vote has been subject to government-sponsored electronic theft.

“–The vote has been stolen from you by a cartel of federal “national security” bureaucrats, who include higher-ups in the Central Intelligence Agency, political party leaders, Congressmen, co-opted journalists — and the owners and managers — of the major Establishment news media, who have decided in concert that how America’s votes are counted, by whom they are counted and how the results are verified and delivered to the public is, as one of them put it, ‘Not a proper area of inquiry.’

“–By means of an unofficial private corporation named News Election Service (NES), the Establishment press has actual physical control of the counting and dissemination of the vote, and it refuses to let the public know how it is done.”

Is the American electorate subjected to cyclic propaganda, pre-selected candidates and winners, and psychological warfare to alienate Americans from the institutions established to serve them by the Constitution? Are the Democratic and Republican National Parties used for a Hegellian experiment in controlled conflict?

Pamela Churchill Harriman, Averil’s wife, is one of the Democratic Party’s biggest fund-raisers. She once gave Bill a job as director of her “PAM PAC” when he was defeated for governor in 1980. Bill paid her back by appointing her as Ambassador to France.

Another Harriman/Bush friend, Eugene Stetson (’34), was an assistant manager for Prescott Bush at Brown Brothers, Harriman’s New York office. He organized the H. Smith Richardson Foundation. The foundation, in the late 1950s, participated in the MKULTRA, the CIA’s domestic covert psychological warfare operation. The Richardson Foundation helped to finance the testing of psychotropic drugs, including LSD, at Bridgewater Hospital in Massachusetts, the center of some of the most brutal MK-ULTRA experiments.

During the Iran-Contra operations, the H. Smith Richardson Foundation was a “private donors steering committee,” working with the National Security Council to co-ordinate the Office of Public Diplomacy. This was an effort to propagandize in favor of and run cover for the Iran-Contra operations, and to coordinate published attacks on opponents of the program.

The H. Smith Richardson Foundation also runs the Center for Creative Leadership at Langley to “train leaders of the CIA,” as well as another center near Greensboro, North Carolina, that trains CIA and Secret Service Agents. Almost everyone who achieves the military rank of general also gets this training.

This is just the tip of an iceberg. You also have eugenics and population control, suppressed history and technology, yearly retreats, profitable partnerships with brutal dictators, deals with “terrorists”, the involvement of the Knights of Malta, war-mongering and profiteering, mind-control, secret societies for teens, ritual magic and more — all spinning the dark threads in the web of conspiracy that our spinning blue ball has gotten caught in.

We’ve got a whole new crop of “Bonesmen” coming up, including George H.W. Bush’s son George W. Bush (’68), Governor of Texas.

When Don Schollander (’68), the Olympic gold-medalist and only known Skull and Bones member living in Portland, was contacted by Willamette Week reporter John Schrang regarding his involvement in the Order, he said, “It’s really something I can’t talk about.”

Not wouldn’t, but “couldn’t”.

In wake of Antony Sutton’s first ground-breaking exposes of the Order, the Sterling Library at Yale has refused to allow any other researchers access to the Russell Trust papers.

Daniel Gilman, like most Bonesmen, makes no mention of Skull & Bones or the Russell Trust in his memoirs or biographies.

So, are we all just ‘fodder” for a secret society with satanic overtones that is attempting to form a one world government with themselves at the helm? Or is the Order of Skull and Bones just a bunch of frat boys from Yale? Wanna bet your future on it?

The Order Of Skull And Bones

 
via

Apr 102017
 
Superhuman abilities have been studied for thousands of years in all walks of life. Religious ‘miracles’ often with hundreds of witnesses have been said to be due to psychic abilities, but studies in China have overwhelming proof that these stories are more than just speculation.

CIA Document Confirms Reality Of Humans With ‘Superhuman Powers’

For the past 20 years scientists have been studying subjects in China who appear to have superhuman powers, and the results have been published in many journals and books.

It is thought that these gifted people have been able to tap into a quantum level, unobservable by the human eye..

To understand properly, you need to be aware of the relationship between our consciousness and our physical reality. Both things are very real, and they have a very complicated relationship. Inventor of quantum theory Max Planck said we should regard consciousness as “fundamental” and matter as “derivative from consciousness.”

Another physicist Eugene Wigner has said on the matter “it was not possible to formulate the laws of quantum mechanics in a fully consistent way without reference to consciousness.”

The document containing the information about the events in China is called “Chronology of Recent Interest in Exceptional Functions of The Human Body in the People’s Republic of China.” The document talks about the Chinese government and it’s work with parapsychology, that is remote viewing, telepathy, psychokinesis.

The document has only recently become available due to a Freedom of Information Act request (FOIA), and it includes interesting details of individuals who have purported superhuman abilities, and that they have been studies countless times by scientists all over the world. The document is on the CIA website, but can only be accessed by the ‘Internet Archives’.

A brief outline of the important items in it the CIA document include:

  • In 1979, a major Chinese science journal, Ziran Zachi, printed a report on “non-visual pattern recognition” where several accounts of exceptional human body function were confirmed.
  • In 1980, the Journal and the Chinese Human Body Science Association held a parapsychology conference in Shanghai with participants from over 20 research institutes and universities from around the world.
  • In 1981, there was a formation of over 100 special places to study children with exceptional abilities with over 100 formally trained scholars.
  • In 1982, the Chinese Academy of Sciences sponsored a public hearing in Beijing and the sole purpose was to discuss humans with parasychological abilities, there were over 400 scholars in attendance.
CHRONOLOGY OF RECENT INTEREST IN EXCEPTIONAL FUNCTIONS OF THE HUMAN BODY IN THE PEOPLE’S REPUBLIC OF CHINA

CIA-RDP96-00792R000400300011-9

Zhang Baosheng

In April of 1982, the Party’s National Committee of Science at Beijing Teacher’s College held a trial to test the abilities of certain students. Most of the results came back negative, apart from Zhang Baosheng. The next year, Zhang was studied again, this time by 19 researchers led by Prof. Lin Shuhang of the physics department of Beijing Teachers college, positive results were recorded for his superhuman powers.

Zhang was able to move objects in and out of sealed containers using only the power of his mind. Prof. Shuhang studied Zhang for six months and he was repeatedly able to place small pieces of paper into sealed test tubes, and then take them out again, without touching them. He repeated the tests with other small items like paperclips and insects, and Zhang could move these, too.

A film was made by the Institute of Space-Medico Engineering in 1987 showcasing the results, which showed a medicine pill moving through an irreversibly sealed glass vial, which occurred in three frames of a 400 frame per second film.

Another release from the CIA (Research Into Paranormal Ability To Break Through Spatial Barriers) contains this description of Zhang’s abilities:

A wooden cabinet 120 by 180 by 60 centimeters was used as a sealed container. Sheets of papers and boards with one of a kind markings were used as the target objects and placed inside the cabinet on the upper shelf. Without damaging the cabinet or opening the door, the person with ESP was able to remove the target objects and also was able to put them back inside. This demonstrates that even when using especially large container it is possible to completely break through spacial barriers, however, the success rate was much lower and was exceptionally difficult. (source)

According to Eric Davis, Ph.D, FBIS, there were other children like Zhang. A declassified US Air Force document obtained via the Federation of American Scientists, contained a report from Shuhuang that ‘gifted children’ could teleport small, physical objects from one place to another. Objects like watches, horseflies, other insects, radio micro-transmitters, photosensitive paper , without ever touching the objects beforehand. The research was carried out by the prestigious Department of Defense, and is a noteworthy case because it was deemed necessary that an unclassified Intelligence Information Report be prepared for public viewing.

In a similar study, Dr. Dean Radin, Chief Scientists at the Institute of Noetic Sciences they were able to record pieces of paper being teleported into sealed plastic containers, the report was published in 2010 by retired research chemist Dong Shen. The most fascinating part of this study, is that the teleportation techniques were taught to other students with a success rate of 40%. This information is published in his book, Supernormal.

Dr. Dean Radin, states:

“Evaluating the details and credibility of these studies have been difficult because many of the papers appear only in Chinese. The techniques have not yet been reported outside of China, and the experimental methods employed in conducting such tests do not appear to be as rigorously controlled as compared to typical Western methods…”

Although, Eric Davis has said,

“The results of the Chinese Teleportation experiments can simply be explained as a human consciousness phenomenon that somehow acts to move or rotate test specimens through a 4th spacial dimension, so that specimens are able to penetrate the solid walls/barriers of their containers without physically breaching them.”

The American Journal of Chinese Medicine has evidence of a similar, amazing story of a woman named Chulin Sun. The study in the US National Library of Medicine documents this lady’s ability to speed up the growth of seeds to an amazing rate.

The study states:
Chulin Sun is a woman with exceptional powers (Shen and Sun, 1996, 1998; Sun, 1998). A member of the Chinese Somatic Science Research Institute, she is a practitioner of Waiqi. Waiqi is a type of qigong that teaches the practitioner to bring the qi energy of traditional Chinese medicine under the control of the mind. Chulin Sun can induce plant seeds to grow shoots and roots several cm long within 20 min using mentally projected qi energy.

This has been demonstrated on more than 180 different occasions at universities as well as science and research institutions in China (including Taiwan and Hong Kong) as well as other countries (e.g., Japan, Thailand, Malaysia, etc.) (Ge et al., 1998; Qin et al., 1998; Lee et al., 1999). We took part in and repeated the qi germination experiments seven times, and five of them succeeded (Ge et al., 1998). This remarkable effect on seed development has drawn widespread attention (Tompkins and Bird, 1973; Lee, 1998), but the biological mechanisms that underlie this phenomenon are unknown.

Sun is thought to have been able to do this by tapping into a level of Qi.

Qi is described as the ‘oneness’ that is flowing through everything all of the time. It is responsible for every good and bad thing that happens to you, and to harness it and use it for good, you must be free of the constraints of the physical world.

These studies prove that ‘super-humans’ may exist and that they may not fully understood by mainstream science, The unwillingness by the government to allow them to be studied in the public eye means only the secret intelligence services are the ones who really understand the extent of these extraordinary human beings.

 

Apr 072017
 

RELEASE: CIA malware for Windows “Grasshopper” — which includes its own language

Wikileaks: CIA Malware For Windows "Grasshopper"

Grasshopper basically allows the Deep State to do anything it wants remotely to a Windows machine. It doesn’t seem to matter if it is Windows XP, Windows 7, Windows 8, or Windows Server versions 2003 or 2008. Almost all the attacks and hijacks bypassed the major intrusion detection systems (MS Security, Symantec, Kapersky, and Rising). No matter how locked down or safe you thought your Windows install was, you were wrong.

Oh even better. It looks like these were designed specifically to avoid the major security programs.

From Wikileaks:

Grasshopper

7 April, 2017

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration”. Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.

Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’ – whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit.” confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.”. While the CIA claims that “[most] of Carberp was not used in Stolen Goods” they do acknowledge that “[the] persistence method, and parts of the installer, were taken and modified to fit our needs”, providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company “HackingTeam”.

The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise.

Leaked Documents

Grasshopper-v2_0_2-UserGuide
Grasshopper-v1_1-AdminGuide
StolenGoods-2_1-UserGuide
GH-Run-v1_1-UserGuide
GH-ServiceProxy-v1_1-UserGuide

 

“Grasshopper” re-installs itself every 22 hours by corrupting Windows Update… even if is disabled.


 

 

Apr 062017
 

The Chemical attack in Syria has all the hallmarks of a false flag

George Soros Linked Group Behind Chemical Attack In Syria

The White Helmets, an al-Qaeda affiliated group funded by George Soros and the British government, have reportedly staged another chemical weapon attack on civilians in the Syrian city of Khan Shaykhun to lay blame on the Syrian government.

 
A day prior to the attack, Gulf-based Orient TV announced “Tomorrow we are launching a media campaign to cover the airstrikes on Hama country side including the usage of chemical warfare against civilians.” This shows clear foreknowledge that the rebels were going to stage an attack by Orient TV.

George Soros Linked Group Behind Chemical Attack In Syria

The White Helmets filmed much of the footage being released on the chemical attack. They have also been known to stage “rescue” videos in the past. However, this time it appears children were indeed killed in the making of this “media campaign.”

Several children appear in the videos suffocating from an unknown chemical substance, while others appear to have unexplained head injuries. It is known 250 people were kidnapped by Al-Qaeda last week from the nearby city of Hama, which is the same number as the current body count of wounded and killed civilians.

In another “coincidence,” a Pakistani British doctor who at the time of the attack was taking interview requests instead of helping the injured who were flooding in, and additionally received gas masks from a British organization three days prior to the attack.

The doctor, Shajul Islam, is being used as a source by US and UK media, despite facing terror charges for kidnapping and torturing two British journalists in Syria and being struck off the medical register. The organization responsible for sending him equipment is under fire for using donations meant for refugees.

George Soros Linked Group Behind Chemical Attack In Syria

In another suspicious event, the White Helmets operating in the same quarry near the attack received sarin-protective respirator suits one month before the attack, even though the Syrian government no longer possesses sarin.

The al-Qaeda-linked rebels have claimed the chemical was sarin gas used by the Syrian government; however, the OPCW has confirmed Syria no longer has chemical weapons and completely dismantled their stockpiles in 2013.

In contrast, the rebels have not gotten rid of the chemical weapons at their disposal.

According to award-winning journalist Seymour Hersch, intelligence reports show the rebels smuggled in chemical weapons from Libya through Turkey with the approval of Hillary Clinton.

George Soros Linked Group Behind Chemical Attack In Syria

In 2013, so-called moderate rebels had filmed themselves killing rabbits with gas and threatening to kill religious minorities. ISIS is also known to be in possession of chemical weapons having conducted attacks on Syrian forces in Deir Ezzor.

However weaponized, sarin would have killed or at least injured unprotected first responders.  Sarin can be absorbed through skin and requires a full body suit; however, the White Helmets appeared to wear only masks and no gloves while they handled exposed victims. Others in the vicinity appear not to be wearing a mask at all and are yet unaffected.

Weaponized sarin is a Weapon of Mass Destruction (WMD) capable of killing thousands. If sarin was indeed used, it must have been a weak, non-weaponized form.

Unsurprisingly, the mainstream media and neo-con politicians have been quick to regurgitate the al-Qaeda-linked rebels version of the events before any investigation takes place.

Israeli President Benjamin Netanyahu was quick to lay blame on the Syrian government, as did Amnesty International. France called for a security council meeting over the incident.

Federica Mogherini, the Italian Representative of the European Union (EU), blamed Assad while UK’s Envoy to the United Nations, Matthew Rycroft, blamed both Russia and Syria.

In response to the allegations, the Syrian Military and the Russian Ministry of Defense denied any involvement in the attack.

NATO governments are unhappy with the Trump administration’s recent statements that they no longer see regime change in Syria as a priority. In response to this, British Prime Minister Theresa May made a statement that Britain was still fully committed to regime change in Syria. The UK and France may have seen a staged chemical attack as an opportunity to push Trump into war with Syria.

George Soros Linked Group Behind Chemical Attack In Syria

The chemical attack came at the same time as another media attack was occurring against the Syrian government, which claimed that Syrian hospitals were in fact secret torture “slaughterhouses.”

The last chemical attack false flag attack occurred in 2013, where the Syrian Army was accused of using the WMD on the same day the Syrian government had invited weapon inspectors into Damascus, which resulted in Syria giving up its chemical weapons.

WATCH: Video Shows Obama Administration Bragging About Removing ‘100 Percent’ of Chemical Weapons From Syria

In the near future neocons may accuse Syria of failing to give up all chemical weapons, in spite of assurances by the OPCW. This is what happened to Iraq in 2003, which was invaded despite surrendering their chemical weapons in the 1990s.

No one questions how the Syrian government could possible use a weapon it doesn’t have, nor what motive it could possibly possess.

For the moment however, the narrative being pushed by neo-cons is “Trump should do what Obama failed to do, bomb Syria for al-Qaeda” and it seems that narrative is winning.

 

 
via

Apr 022017
 

The United States’ Secret Plan to Invade Canada

War Plan Red - A 1935 US Plan For The Invasion Of Canada

A time-honored tradition in the U.S. military, contingency plans have been drawn up for the defense against, and invasion of, most major military powers. In fact, in response to recent events on the Korean peninsula, the U.S. and South Korea recently signed on to such a plan. One of the most interesting episodes in this rich history of preparing for things that will probably never happen came when Uncle Sam planned to invade Johnny Canuck.

Early Planning

In the years leading up to World War II, beginning in fact in the 1920s, the army began planning for wars with a variety of countries, designating each plan by a different color: Germany (black), Japan (orange), Mexico (green) and England (red); as a dominion of Great Britain, Canada (crimson) was presumed to be loyal to England, and thus was included in the plan against a supposed British invasion (not to be confused with that of the 1960s).

The paranoid U.S. military strategists who devised War Plan Red believed that if the Britain and America were to battle again, it would begin from a trade dispute. Whatever the cause, army planners anticipated that any war with England would be prolonged, not only because of British and Canadian tenacity, but also from the fact that Britain could draw manpower and resources from its empire, including at that time Australia, Hong Kong, India, Kenya, New Zealand, Nigeria, Palestine, South Africa and Sudan.

Canadian Invasion Plan

Different versions of the plan were proposed, and one was first approved in 1930 by the War Department. It was updated in 1934-1935, and, of course, never implemented. Although it was far reaching and addressed some of Britain’s greatest strengths, such as the Royal Navy, one of the chief areas of concern was the U.S.’s long border with Canada. As a result, the plan addressed our northern neighbors with great detail, to wit:

British Columbia

With its vital naval base, military strategists planned a naval attack on Victoria, launched from Port Angeles, Washington, as well as a combined assault on Vancouver and its island. Successful occupation of this area would effectively cut off Canada from the Pacific.

Manitoba

The central hub for the Canadian railway system was located in Manitoba’s capital city, Winnipeg; army strategists felt that a land assault could easily be launched from Grand Forks, North Dakota, and Canada’s rail lines neutralized.

New Brunswick and Nova Scotia

Military planners apparently hoped to stun the Maritime Provinces with a poison gas attack on Nova Scotia’s capital city, Halifax, then also home to a major naval base. The chemical battle would then be followed by a sea invasion at St. Margaret’s Bay. It that didn’t work, an overland invasion and occupation of New Brunswick would, hopefully, isolate the valuable seaports of Nova Scotia from the remainder of Canada, effectively stopping British resupply of its forces.

Ontario

A three-pronged attack, arising from Buffalo, Detroit and Sault Ste. Marie would gain control of the Great Lakes for the U.S. In addition to causing a crushing blow to British supply lines, it would allow the United States to control most of Canada’s industrial production.

Quebec

An overland attack launching from adjacent New York and Vermont was planned. Control of this French-speaking province would, when combined with control of the Maritime Provinces, stop Britain from having any entry point to the remainder of the country from the Eastern seaboard.

Revelation of the Plan

Although it was declassified in 1974, portions of the plan were inadvertently leaked long before. During what was supposed to be classified testimony by military brass to the House Military Affairs Committee, two generals revealed some of the details of War Plan Red. That testimony was mistakenly published in official reports, which were picked up and printed by the New York Times.

Also revealed in the New York Times was the fact that the United States Congress had assigned $57 million in 1935 (nearly $1 billion today) in order to build three air bases near the U.S./Canadian border in line with War Plan Red’s recommendations, in case the U.S. needed to defend against or attack Canada.  These air bases were supposed to be disguised as civilian airports, but the Government Printing Office accidentally reported the existence of the air bases on May 1 of 1935, blowing their cover.

Interestingly, War Plan Red’s recommendations also proposed that the U.S. not just invade in such a war with Britain and Canada, but take over, adding any conquered regions as states to the United States.

The Sad History of Americans Invading Canada Badly

Americans have a history of underestimating the Canadians:

Revolutionary War

In September 1775, Benedict Arnold (when he was still on our side) led an unsuccessful assault on Quebec City overland through difficult Maine wilderness; over 40% of Arnold’s men were lost making the attempt, and yet, inexplicably, he was promoted to Brigadier General.

War of 1812

During the second war with Britain, Thomas Jefferson opined that to occupy Canada was a “mere matter of marching” for U.S. troops. Yet attacks in the Old Northwest, across the Niagara River, and north from Lake Champlain, all failed.

Proxy “War” for Ireland

Over a period of five years from 1866 to 1872, Irish Catholics from the U.S. engaged in a series of raids on Canadian targets, including forts and customs houses. Known as the Fenian raids, the Fenian Brotherhood had hoped that their actions would force the British to withdraw from Ireland. They were unsuccessful.

Post Cold War

In 1995, Michael Moore created a fictional war between the United States and Canada in the comedy, Canadian Bacon. Like the real-life Americans who went before them, the fictional invasion in this farcical political commentary failed.

What Comes Around Goes Around

Before you get the idea that only Americans are aggressive bastards, you should know that the Canadians had developed a plan to invade the United States before the U.S. ever started on its scheme.

Characterized as a counterattack, the 1921 plan more accurately resembles a preemptive war. The brainchild of Lieutenant Colonel Buster Sutherland Brown of the Canadian Army, the plan called for a surprise attack on the U.S. as soon as the Canadians had “evidence” that America was planning an invasion; it was felt that a preemptive strike was required, as it would be the only way Canada could prevail in a battle with its larger, southern neighbor, which benefited from a far greater arsenal and much more manpower.

Other advantages of the quick strike included the fact that the war would be fought on American territory, so losses in civilian life and infrastructure would be borne by the Americans. Finally, the colonel thought this plan would best buy the Canadians time for their allies, the British, to come to their rescue before the Americans could launch an effective counter strike.

It’s always the quiet ones.

War Plan Red: The United States’ Secret Plan to Invade Canada and Canada’s Secret Plan to Invade the United States

 
via

Mar 312017
 

Vault 7 Part 3: WikiLeaks releases the CIA ‘Marble’ dump

CIA Vault 7 Part 3 "Marble" Allows CIA To Cover Their Tracks
WikiLeaks has released the latest batch of documents detailing CIA hacking tactics. The third release, named ‘Marble’, contains 676 source code files for the agency’s secret anti-forensics framework.Marble Framework, which WikiLeaks explains is part of the CIA’s Core Library of malware, is used to hamper forensic investigators from attributing viruses, trojans and hacking attacks to the CIA. WikiLeaks said Marble was in use at the agency as recently as 2016.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

From Wikileaks:

Marble Framework

31 March, 2017

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

 
via

Mar 272017
 

Over the last two decades, the Pentagon has lost an astonishing $10 trillion dollars… and the Defense Department has no idea where it went!

$10 Trillion Missing From Pentagon And No One Knows Where It Is

Over a mere two decades, the Pentagon lost track of a mind-numbing $10 trillion — that’s trillion, with a fat, taxpayer-funded “T” — and no one, not even the Department of Defense, really knows where it went or on what it was spent.

Even though audits of all federal agencies became mandatory in 1996, the Pentagon has apparently made itself an exception, and a full 20 years later stands firmly resolute in never having complied.

Defense officials insist an audit would take too long and ironically cost too much.

“Over the last 20 years, the Pentagon has broken every promise to Congress about when an audit would be completed,” Rafael DeGennaro, director of Audit the Pentagon, told the Guardian recently. “Meanwhile, Congress has more than doubled the Pentagon’s budget.”

President Trump’s newly-proposed budget seeks to toss an additional $54 billion into the evidently bottomless pit.

Without the mandated audit, the Department Of Defense could be purchasing damned near anything, at any cost, and use, or give, it — to anyone, for any reason.

Officials with the Government Accountability Office and Office of the Inspector General have catalogued egregious financial disparities at the Pentagon for years — yet the Defense Department grouses the cost and energy necessary to perform an audit in compliance with the law makes it untenable.

Astonishingly, the Pentagon’s own watchdog tacitly approves this technically illegal workaround — and the legally gray and, yes, literally, on-the-books-corrupt practices in tandem — to what would incontrovertibly be a most unpleasant audit, indeed.

Take the following of myriad examples, called “Plugging,” for which Pentagon bookkeepers are not only encouraged to conjure figures from thin air, but, in many cases, they would be physically and administratively incapable of performing the job without doing so — without ever having faced consequences for this brazen cooking of books.

Reuters reported the results of an investigation into Defense’s magical number-crunching well over three years ago, on November 18, 2013 — detailing the illicit tasks of 15-year employee, Linda Woodford [who] spent the last 15 years of her career inserting phony numbers in the U.S. Department of Defense’s accounts.”

Woodford, who has since retired, and others like her, act as individual pieces in the amassing chewed gum only appearing to plug a damning mishandling of funds pilfered from the American people to fund wars overseas for resources in the name of U.S. defense.

“Every month until she retired in 2011,” Scot J. Paltrow wrote for Reuters, “she says, the day came when the Navy would start dumping numbers on the Cleveland, Ohio, office of the Defense Finance and Accounting Service, the Pentagon’s main accounting agency. Using the data they received, Woodford and her fellow DFAS accountants there set about preparing monthly reports to square the Navy’s books with the U.S. Treasury’s – a balancing-the-checkbook maneuver required of all the military services and other Pentagon agencies.

“And every month, they encountered the same problem. Numbers were missing. Numbers were clearly wrong. Numbers came with no explanation of how the money had been spent or which congressional appropriation it came from. ‘A lot of times there were issues of numbers being inaccurate,’ Woodford says. ‘We didn’t have the detail … for a lot of it.’”

Where a number of disparities could be corrected through hurried communications, a great deal — thousands each month, for each person on the task — required fictitious figures. Murkily deemed, “unsubstantiated change actions” — tersely termed, “plugs” — this artificial fix forcing records into an unnatural alignment is common practice at the Pentagon.

Beyond bogus books, the Pentagon likely flushed that $10 trillion in taxes down the toilet of inanity that is unchecked purchasing by inept staff who must be devoid of prior experience in the field of defense.

This tax robbery would eclipse the palatability of blood money — if it weren’t also being wasted on items such as the 7,437 extraneous Humvee front suspensions — purchased in surplus over the inexplicable 14-year supply of 15,000 unnecessary Humvee front suspensions already gathering warehouse-shelf dust.

And there are three items of note on this particular example, of many:

One, the U.S. Department of Defense considers inventory surpassing a three-year supply, “excessive.”

Two, the stupefying additional seven-thousand-something front suspensions arrived, as ordered, during a period of demand reduced by half.

Three, scores of additional items — mostly unaccounted for in inventory — sit untouched and aging in storage, growing not only incapable of being used, but too dangerous to be properly disposed of safely.

Worse, contractors greedily sink hands into lucrative contracts — with all the same supply-based waste at every level, from the abject disaster that is the $1 trillion F-35 fighter program, to the $8,123.50 shelled out for Bell Helicopter Textron helicopter gears with a price tag of $445.06, to the DoD settlement with Boeing for overcharges of a whopping $13.7 million.

The latter included a charge to the Pentagon of $2,286 — spent for an aluminum pin ordinarily costing just $10 — the irony of whose 228.6 percent markup cannot be overstated.

Considering all the cooking of numbers apparently fueled with burning money stateside, you would think Defense channeled its efforts into becoming a paragon of economic efficiency when the military defends the United States. Overseas. From terrorism. And from terrorists. And terrorist-supporting nations.

But this is the Pentagon — and a trickle of telling headlines regularly grace the news, each evincing yet another missing shipment of weapons, unknown allocation of funds, or retrieval of various U.S.-made arms and munitions by some terrorist group deemed politically less acceptable than others by officials naming pawns.

In fact, so many American weapons and supplies lost by the DoD and CIA become the property of actual terrorists — who then use them sadistically against civilians and strategically against our proxies and theirs — it would be negligent not to describe the phenomenon as pattern, whether or not intent exists behind it.

For now the painstaking audit imperative to Department Of Defense accountability remains only a theory… while the Pentagon’s $10 trillion sits as the world’s largest elephant in apathetic America’s living room.

 

 
via

The Mysterious Deaths Of Russian Journalists

 Political  Comments Off on The Mysterious Deaths Of Russian Journalists
Mar 262017
 

Whether or not Putin is behind it, a lot of Journalists have ended up dead in Russia.

List Of Russian Journalists Killed in During The Obama Administration

The dangers to journalists in Russia have been well-known since the early 1990s but concern over the number of unsolved killings soared after Anna Politkovskaya’s murder in Moscow on 7 October, 2006. Russia has become one of the most dangerous countries for journalists. Besides numerous cases of assault and battery as well as frequent threats against media representatives, there has been a string of suspicious deaths among prominent Russian reporters. Some of these incidents have attracted international attention since they involved leading critics of the Russian government. The failure of Russian law enforcement agencies to secure a court conviction in any of these cases has only deepened the mystery surrounding the murders.

Here’s all of the Russian Journalists who were killed during the Obama administration during which Hillary Clinton famously handed the Russians a ‘Reset Button‘.

2009

30 March – Sergei Protazanov, layout artist with Grazhdanskoye soglasie newspaper, Khimki nr. Moscow. Link to work questioned.

29 June – Vyacheslav Yaroshenko, chief editor of Corruption and Criminality newspaper in Volgograd died after a severe head injuries in June. He was allegedly struck in the temple by the unknown assailant, although the local police claims fall from the ladder as the reason for injury.

15 July – Natalia Estemirova, a human rights activist with Memorial, who worked with journalists from Novaya gazeta, especially Anna Politkovskaya, and occasionally published in the newspaper herself, having been a TV reporter pre-1999. After years of investigating murders and kidnapping in Chechnya, Estemirova was herself abducted that morning in Grozny and found shot to death by the roadside several hours later in neighbouring Ingushetia.

11 August – Malik Akhmedilov, deputy chief editor of the Avar language newspaper Khakikat (Truth), was found shot dead near the Dagestan capital Makhachkala.

25 October – Maksharip Aushev was shot dead in Nalchik, capital of Kabardino-Balkaria. When Magomed Yevloyev gave up running Ingushetia.ru, and his replacement (Rosa Malsagova) had to flee abroad to escape threats and harassment, Aushev ran the successor website Ingushetia.org. Link to past or present work unclear.

16 November – Olga Kotovskaya, Kaskad radio & TV company, Kaliningrad. Died in a fall from 14th storey-building under suspicious circumstances. Investigation under “Incitement to suicide”.

2010

20 January – Konstantin Popov died from a beating received a fortnight earlier by Russian police in a detoxification centre for the drunk and disorderly. A 26-year-old police sergeant was charged with his killing.

23 February – Journalist Ivan Stepanov was stabbed to death at his dacha. The murderers have been arrested and sentenced to 16 and 18 years of prison.

20 March – Maxim Zuyev was found murdered in a Kaliningrad flat he was renting. Seven years earlier he was interrogated by the city’s police for publishing an anonymous letter alleging corruption among high-ranking police officers in the enclave. The Investigative Committee has marked the case as “crime solved.

5 May – Shamil Aliyev, founder of two radio stations and a director of TV network was shot in his car by two unidentified attackers, who also killed his bodyguard and wounded his driver.

13 May – Said Magomedov, director of local television station, Sergokalinsky district, Dagestan. Shot dead when travelling with repairmen to restore sabotaged TV transmitter.

25 June – Dmitry Okkert, Moscow. A presenter with the Expert TV channel, Okkert was found stabbed to death in his own apartment. The director of the Expert media holding, Valery Fadeyev, does not believe that the brutal killing of his colleague was linked to his journalistic activities.

25 July – Bella Ksalova, Cherkessk. A correspondent for the Caucasian Knot website and news agency, Ksalova died in a hospital after being hit by a car near her home. The driver was sentenced to 3 1/4 years in penal colony.

1 August – Malika Betiyeva, Grozny-Shatoi highway. The deputy chief editor of Molodyozhnaya smena, and Chechnya correspondent of the “Dosh” (Word) magazine, died with four of her immediate family when a speeding jeep crashed into her car.

11 August – Magomed Sultanmagomedov, Makhachkala. The director of the Makhachkala TV station died in the hospital after his car was shot at from another vehicle. This was preceded by an attempted bombing on 18 November 2008.

23 October – Yevgeny Fedotov died in a hospital due to the head injuries received in a violent quarrel with his neighbour. The latter has been charged for manslaughter.

2011

15 December – Gadzhimurat Kamalov, Makhachkala. Investigative reporter – shot 6 times in a drive-by outside his newspaper’s offices.

2012

7 July – Alexander Khodzinsky, journalist in Tulun, was stabbed to death by a local businessman Gennady Zhigarev, former deputy. 5 December – Kazbek Gekkiev, journalist for local TV programmes in Kabardino-Balkaria, was shot dead on a Nalchik street, after getting threats from local wahhabi extremists.

2013

9 July – Akhmednabi Akhmednabiyev, deputy editor of the Novoe Delo was killed (after numerous death threats and previous assassination attempt in January 2013 by several gunshots while he was driving just 50 metres from his house on the outskirts of provincial capital Makhachkala.

2014

1 August – Journalist and human rights activist Timur Kuashev was abducted from his home and later found dead in Kabardino-Balkaria. Kuashev was previously stopped by local police a number of times and received death threats.

2016

March 31 – Journalist Dmitry Tsilikin was stabbed to death in his flat in Saint Petersburg. The suspected killer is neo-nazi Sergey Kosyrev. The murder is attributed to Tsilikin’s homosexual orientation.

2017

March 17 – Yevgeny Khamaganov died of unexplained causes in Ulan-Ude. Khamaganov was known for writing articles that criticized the federal government and was allegedly beaten by unknown assailants on March 10.

Obama more flexibility after the election

 

 

Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected

 Political  Comments Off on Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected
Mar 242017
 
WikiLeaks Vault 7 shows that the CIA has developed a huge range of attacks against iPhones since at least 2008.

Wikileaks: CIA Hacks Dubbed Dark Matter Reveal How Apple Products Are Infected

Yesterday, Wikileaks released another series from their ‘Vault 7’ CIA hacks called ‘Dark Matter’ where they reveal how Apple products are infected.

According to Wikileaks, ‘Dark Matter’ contains documentation for several CIA projects that infect Apple MAC computer firmware developed by the CIA’s Embedded Development Branch (EDB). Interestingly… the infection persists even if the operating system is re-installed.

From Wikileaks:

Dark Matter

23 March, 2017

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Leaked Documents

Sonic Screwdriver
DerStarke v1.4
DerStarke v1.4 RC1 – IVVRR Checklist
Triton v1.3
DarkSeaSkies v1.0 – URD

Dark Matter Dog

 
via

Mar 222017
 
Declassified CIA secret weapon of assassination – The Heart Attack Gun

CIA's Heart Attack Gun

A CIA secret weapon used for assassination shoots a small poison dart to cause a heart attack, as explained in Congressional testimony in the short video below. The dart from this secret CIA weapon can penetrate clothing and leave nothing but a tiny red dot on the skin. On penetration of the deadly dart, the individual targeted for assassination may feel as if bitten by a mosquito, or they may not feel anything at all. The poisonous dart completely disintegrates upon entering the target.

The lethal poison then rapidly enters the bloodstream causing a heart attack. Once the damage is done, the poison denatures quickly, so that an autopsy is very unlikely to detect that the heart attack resulted from anything other than natural causes. Sounds like the perfect James Bond weapon, doesn’t it? Yet this is all verifiable in Congressional testimony.

The astonishing information about this secret weapon of the CIA comes from U.S. Senate testimony in 1975 on rogue activities of the CIA. This weapon is only one of many James Bond-like discoveries of the Church Committee hearings, officially known as the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities.

The suspicious death of Justice Scalia

Could this or a similar secret weapon have been used, for instance, in the probable murder of Justice Scalia? This report from the highly respected Liberal newspaper The Washington Post may confirm that conspiracy theorists are onto something in questioning the suspicious death of Justice Scalia.

Yet as details of his sudden death trickled in Sunday, it appeared that the hours afterward were anything but orderly. The man known for his elegant legal opinions and profound intellect was found dead in his room at a hunting resort by a ranch owner.

It then took hours for authorities in remote West Texas to find a justice of the peace, officials said Sunday. When they did, she pronounced Scalia dead of natural causes without seeing the body and decided not to order an autopsy. A second justice of the peace, who was called but couldn’t get to Scalia’s body in time, said she would have ordered an autopsy.

 

Secrets of the CIA

To watch the revealing 45-minute documentary from which the clip below was taken, click here. In this riveting exposé, five former CIA agents describe how their initial pride and enthusiasm at serving their nation turned to anguish and remorse, as they realized that they were actually subverting democracy and killing innocent civilians all in the name “national security” and promoting foreign policy agendas.

Watch the video below for the description of a former CIA secretary and Congressional testimony on this secret assassination weapon which caused heart attacks.

The testimony in the video is from 1975, well over 40 years ago. With the ensuing leaps in technological capability, just imagine what kinds of secret weapons for assassination have been developed since. There is good evidence that technology has even been developed to cause suicidal feelings in a person.

1975 Church Committee

The above video shows a dramatic interaction between Senator Frank Church and CIA director William Colby.

The goal of the proceeding, per the Senate’s website:

“To educate the public about the misdeeds of national intelligence agencies, the committee held televised hearings in the Senate Caucus Room. After gaveling to order the first hearing, Chairman Church dramatically displayed a CIA poison dart gun to highlight the committee’s discovery that the CIA directly violated a presidential order by maintaining stocks of shellfish toxin sufficient to kill thousands. Critics saw this as evidence that the committee’s work was a vehicle for Senator’s Church presidential ambitions.”

The Senate hearing came after reports from investigative journalist Seymour Hersh on the CIA’s illicit tactics in both destabilizing foreign governments and conducting intelligence operations against American citizens. Though the hearing ended with a committee decision that Congress should keep better tabs on the intelligence community, many questions remain unanswered. Does the CIA still have this heart attack gun? Have they ever used it? And what other James Bond-esque secret weapons have they been hiding from us?

And what about the death of Andrew Breitbart?

On the night of February 29, 2012, Breitbart collapsed suddenly while walking in Brentwood. He was rushed to Ronald Reagan UCLA Medical Center, where he was pronounced dead just after midnight. He was 43 years old. An autopsy by the Los Angeles County Coroner’s Office showed that he had hypertrophic cardiomyopathy, with focal coronary atherosclerosis, and died of heart failure.

Unproven conspiracy theories arose about his death. The toxicology report showed, “No prescription or illicit drugs were detected. The blood alcohol was .04%. No significant trauma was present and foul play was not suspected.

The CIA's Heart Attack Gun - Justice Scalia

Previously:
Wikileaks Exposes The Possible Assassination Of Scalia
Andrew Breitbart Tweet Before His Death Adds Fuel To Podesta D.C. Sex-Trafficking Ring
 

JFK Murder Plot “Deathbed Confession” Aired On National Radio

 Political  Comments Off on JFK Murder Plot “Deathbed Confession” Aired On National Radio
Mar 212017
 
Former CIA agent, Watergate conspirator E. Howard Hunt names the men who killed Kennedy

JFK Murder Plot "Deathbed Confession" Aired On National Radio

The “deathbed confession” audio tape in which former CIA agent and Watergate conspirator E. Howard Hunt admits he was approached to be part of a CIA assassination team to kill JFK. It is an astounding development that has gone completely ignored by the establishment media.

Saint John Hunt, son of E. Howard Hunt, appeared on the nationally syndicated Coast to Coast Live radio show in April of 2007 to discuss the revelations contained in the tape.

Hunt said that his father had mailed cassette the tape to him alone in January 2004 and asked that it be released after his death. The tape was originally 20 minutes long but was edited down to four and a half minutes for the Coast to Coast broadcast.

Below is the audio clip of the tape:


 
E. Howard Hunt names numerous individuals with both direct and indirect CIA connections as having played a role in the assassination of Kennedy, while describing himself as a “bench warmer” in the plot. Saint John Hunt agreed that the use of this term indicates that Hunt was willing to play a larger role in the murder conspiracy had he been required.

Hunt alleges on the tape that then Vice President Lyndon B. Johnson was involved in the planning of the assassination and in the cover-up, stating that LBJ, “Had an almost maniacal urge to become president, he regarded JFK as an obstacle to achieving that.”

The three tramps arrested in the wake of the Kennedy assassination have long been suspected of being conspirators

The three tramps arrested in the wake of the Kennedy assassination have long been suspected of being conspirators

Asked if his father followed the conspiracy theories into the Kennedy assassination, Saint John said the elder Hunt did follow the work of AJ Weberman, a New York freelance writer, who in the early 70’s first accused Hunt of being one of three bums who were arrested in Dealy Plaza. The so-called bums (pictured above) were interrogated and later released by authorities shortly after the assassination. Weberman, one of the founders of the Youth International Party, the Vippies, published photographs of the tramps and found that two of them bore striking similarities to Hunt and Frank Sturgis, also named by Hunt in the tape as having been played a role in the assassination conspiracy.

Was E Howard Hunt one of the “tramps”?

Was E Howard Hunt one of the “tramps”?

Asked for his opinion as to whether his father was indeed one of the Dealy Plaza tramps, Saint John, in a stunning revelation, said one of the tramps indeed looked much like his father did in 1963 (see comparison above).

CIA operative Frank Stugis' striking resemblance to one of the "tramps".

CIA operative Frank Stugis’ striking resemblance to one of the “tramps”.

Charles Harrelson was allegedly identified as the third tramp.

Other researchers believe the “Hunt tramp” to really be Chauncey Holt, who apparently later confessed to the fact. Charles Harrelson was allegedly identified as the third tramp.

Saint John Hunt said that shortly before his death, his father had felt “deeply conflicted and deeply remorseful” that he didn’t blow the whistle on the plot at the time and prevent the assassination, but that everyone in the government hated Kennedy and wanted him gone in one way or another. Kennedy’s promise to “shatter the CIA into a thousand pieces and scatter the remnants to the wind” was being carried out and this infuriated almost everyone at the agency.

Hunt also said that his mother’s death in a December 8, 1972 plane crash in Chicago was suspicious and that there was evidence of a White House cover-up surrounding the circumstances of the alleged accident.

Investigators discovered $10,000 dollars in her luggage and Hunt alleged that his mother traveled around the country using Nixon campaign money to payoff the families of the Watergate burglars to keep them quiet about the involvement of the Nixon White House in the Watergate break-in and cover-up.

Hunt cited numerous coincidences surrounding the aftermath of the crash, including Nixon’s appointment of his henchman, Egil Krough, to the National Transportation Safety Board which investigates plane crashes, the very day after the incident.

Eyewitnesses reported that the plane exploded above treetop level before it had even hit the runway.

Hunt said that “at least 20-25 FBI members,” as well as numerous DIA agents were at the scene of the crash within minutes before rescue personnel had even arrived, and that this fact was attested to in a letter sent by the head of the Chicago FBI to investigator Sherman Skolnick.

Hunt said that his safety was guaranteed by the dissemination of the tape and that he had several copies and had mailed others to addresses both abroad and in the U.S.

“Once this information is out there’s really no point in anyone trying to do me in or do me wrong – someone may try to discredit me but I have no skeletons in my closet,” said Hunt.

As we have previously reported, the night before the Kennedy assassination, Lyndon Baines Johnson met with Dallas tycoons, FBI moguls and organized crime kingpins – emerging from the conference to tell his mistress Madeleine Duncan Brown that “those SOB’s” would never embarrass him again.

Though Brown first went public on her 21-year relationship with Johnson in the early 80’s, to this day her shocking revelations about how he had told her the Kennedy’s “would never embarrass me again” the night before the assassination are often ignored by the media who prefer to keep the debate focused on issues which can’t definitively be proven either way (or at least can be spun and whitewashed).

George Herbert Walker Bush was also pictured at the scene of the crime in Dealy Plaza.
George Herbert Walker Bush was also pictured at the scene of the crime in Dealy Plaza.

In addition, Barr McClellan, father of former White House press secretary Scott McClellan and a partner in the Austin law firm that represented Johnson, wrote in his 2003 book that LBJ was a key player in the organization of the assassination and its cover-up. McClellan’s revelations were the subject of a subsequent History Channel documentary called The Guilty Men.

 
via