Guest views are now limited to 12 pages. If you get an "Error" message, just sign in! If you need to create an account, click here.

Jump to content

Search the Community

Showing results for tags 'CIA'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Welcome to DinarVets!
    • Rules, Announcements & Introductions
    • Questions and Tech Support
  • VIP Area
    • VIP Section
    • VIP Section
  • Iraq Topics
    • Iraq & Dinar Related News
    • Dinar Rumors
    • RV & Dinar Questions
    • Opinions, Perspectives, and Your Two Cents on the Iraqi Dinar
    • Chat Logs
    • ISX (Iraqi Stock Exchange)
    • Warka and Iraqi Banking
    • Dinar-ify me!
    • Buying and Selling Dinar
    • LOPster tank
    • Debate Section
  • General Topics
    • Off Topic posts
    • Natural Cures and Health Talk
    • Politics, 2nd Amendment (Gun Control)
    • Iraqi Inspiration and Stories of our Soldiers
    • World Economy
    • Music Videos etc
    • DV Weekly Powerballs.
  • Investing
    • Forex Discussion
    • Penny Stocks
    • Wall Street
    • Gold & Precious Metals
    • Foreign Currencies
    • Tax Discussion
    • Investment Opportunities and Wealth Management

Calendars

There are no results to display.

Product Groups

  • VIP Membership Packages
  • OSI Products
  • Just a text
  • RV Intel and the Cash In Guide!

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Phone Number (for VIP text message)


AIM


ICQ


Jabber


Location


Interests


Biography


Location


Interests


Occupation


My Facebook Profile ID


My Twitter ID

Found 5 results

  1. www.zerohedge.com/news/2014-10-09/german-journalist-blows-whistle-how-cia-controls-media German Journalist Blows Whistle On How The CIA Controls The Media 10/09/2014 14:04 -0400 Germany SPY inShare2 Submitted by Michael Krieger via Liberty Blitzkrieg blog, “I was bribed by billionaires, I was bribed by the Americans to report…not exactly the truth.” - Udo Ulfkotte, a former editor of one of Germany’s main daily publications, Frankfurter Allgemeine Zeitung Some readers will see this and immediately dismiss it as Russian propaganda since the interview appeared on RT. This would be a serious mistake. Whether you want to admit it or not, CIA control of the media in the U.S. and abroad is not conspiracy theory, it is conspiracy fact. Carl Bernstein, who is best known for his reporting on Watergate, penned a 25,000 word article in Rolling Stone after spending six months looking at the relationship of the CIA and the press during the Cold War years. Below is an excerpt, but you can read the entire thing here. In 1953, Joseph Alsop, then one of America’s leading syndicated columnists, went to the Philippines to cover an election. He did not go because he was asked to do so by his syndicate. He did not go because he was asked to do so by the newspapers that printed his column. He went at the request of the CIA. Alsop is one of more than 400 American journalists who in the past twenty?five years have secretly carried out assignments for the Central Intelligence Agency, according to documents on file at CIA headquarters. Some of these journalists’ relationships with the Agency were tacit; some were explicit. There was cooperation, accommodation and overlap. Journalists provided a full range of clandestine services—from simple intelligence gathering to serving as go?betweens with spies in Communist countries. Reporters shared their notebooks with the CIA. Editors shared their staffs. Some of the journalists were Pulitzer Prize winners, distinguished reporters who considered themselves ambassadors without?portfolio for their country. Most were less exalted: foreign correspondents who found that their association with the Agency helped their work; stringers and freelancers who were as interested in the derring?do of the spy business as in filing articles; and, the smallest category, full?time CIA employees masquerading as journalists abroad. In many instances, CIA documents show, journalists were engaged to perform tasks for the CIA with the consent of the managements of America’s leading news organizations. Like any good intelligence agency, the CIA learned from its mistakes upon being exposed, and has since adjusted tactics. This is where the concept of “non-official cover” comes into play. The term was recently described by German journalist Udo Ulfkotte, in a blistering RT interview. Mr. Ulfkotte was previously a respected journalist for one of Germany’s main dailies, Frankfurter Allgemeine Zeitung (FAZ), so he is no small fry. “Non-official cover” occurs when a journalist is essentially working for the CIA, but it’s not in an official capacity. This allows both parties to reap the rewards of the partnership, while at the same time giving both sides plausible deniability. The CIA will find young journalists and mentor them. Suddenly doors will open up, rewards will be given, and before you know it, you owe your entire career to them. That’s essentially how it works. But don’t take it from me… If this peaked your curiosity, read about Operation Mockingbird. OPERATION MOCKINGBIRD http://en.wikipedia.org/wiki/Operation_Mockingbird CIA AND THE MEDIA by Carl Bernstein: http://www.carlbernstein.com/magazine_cia_and_media.php
  2. http://topconservativenews.com/2014/07/operation-hornets-nest-alleged-snowden-document-says-usukisrael-are-behind-isis/ Operation Hornets Nest: Alleged Snowden document says US/UK/Israel are behind ISIS The former employee at US National Security Agency (NSA), Edward Snowden, has revealed that the British and American intelligence and the Mossad worked together to create the Islamic State of Iraq and Syria (ISIS). Snowden said intelligence services of three countries created a terrorist organisation that is able to attract all extremists of the world to one place, using a strategy called “the hornet’s nest”. NSA documents refer to recent implementation of the hornet’s nest to protect the Zionist entity by creating religious and Islamic slogans. According to documents released by Snowden, “The only solution for the protection of the Jewish state “is to create an enemy near its borders”. Leaks revealed that ISIS leader and cleric Abu Bakr Al Baghdadi took intensive military training for a whole year in the hands of Mossad, besides courses in theology and the art of speech.. Facts: 1) ISIS leader Al-Baghdadi was once a super-high level prisoner of the US government. Despite the fact that the US had offered a ten million dollar reward for him, the Obama regime ordered his release in 2009. 2) The Obama regime, with major support from Senate neo-cons John McCain and Lindsey Graham, gave hundreds of millions in military aid to Sunni Jihadists in Syria. Thousands of individuals receiving US aid are now members of ISIS. In fact, ISIS has even posted pictures of ISIS fighters with US Senator John McCain on the internet. 3) Israel has directly aided Sunni Jihadists in Syria by bombing Syrian military assets during Jihadist attacks. 4) The Israeli Prime Minister has reacted to the ISIS spearheaded Sunni/Shia Civil War in Iraq with borderline glee. The president of Israel has also suggested that a Sunni/Shia war is beneficial to the future of Israel. 5) The US and Britiain provided Sunni Jihadists with Toyota trucks in Syria. When, an army of ISIS fighters rolled over the Syria/Iraq border it looked like a commercial for Toyota. http://inquiringminds.cc/uk-911-truth-according-to-document-released-by-nsa-whistleblower-edward-snowden-abu-bakr-al-baghdadi-leader-of-isis-is-a-mossad-intelligence-asset-alex-james [uK-911-Truth] According to document released by NSA whistleblower Edward Snowden, Abu Bakr al-Baghdadi, leader of ISIS, is a MOSSAD intelligence asset – Alex James Posted on July 23, 2014 by Admin From: Subject: According to document released by NSA whistleblower Edward Snowden, Abu Bakr al-Baghdadi, leader of ISIS, is a MOSSAD intelligence asset Editor’s note: The validity of the document mentioned below cannot be verified due to the exclusivity of the Snowden cache. Cryptome sent a letter to various sources in possession of the documents, including The New York Times, Washington Post, The Guardian, Barton Gellman, Laura Poitrias, Glenn Greenwald, ACLU, EFF and others demanding an accounting. The allegation about ISIS and al-Baghdadi, however, pairs up with other information demonstrating ISIS is an intelligence asset. According a document recently released by NSA whistleblower Edward Snowden, Abu Bakr al-Baghdadi, the leader of ISIS, now the Islamic State, is an intelligence asset. The NSA document reveals the United States, Israel, and Britain are responsible for the creation of ISIS. Earlier this month Nabil Na’eem, the founder of the Islamic Democratic Jihad Party and former top al-Qaeda commander, told the Beirut-based pan-Arab TV station al-Maydeen all current al-Qaeda affiliates, including ISIS, work for the CIA. [just like Qari Zainuddin revealed that TTP Mehsud is CIA and like Siebel Edmons revealed Bin Lade was CIA until 9/11] ISIS is a well-armed and trained terrorist group now in control of large areas of Iraq and Syria. The NSA document states the group was established by U.S., British and Israeli intelligence as part of a strategy dubbed “the hornet’s nest” to draw Islamic militants from around the world to Syria. The former employee at US National Security Agency (NSA), Edward Snowden, has revealed that the British and American intelligence and the Mossad worked together to create the Islamic State of Iraq and Syria (ISIS). Snowden said intelligence services of three countries created a terrorist organisation that is able to attract all extremists of the world to one place, using a strategy called “the hornet’s nest”. NSA documents refer to recent implementation of the hornet’s nest to protect the Zionist entity by creating religious and Islamic slogans. According to documents released by Snowden, “The only solution for the protection of the Jewish state “is to create an enemy near its borders”. Leaks revealed that ISIS leader and cleric Abu Bakr Al Baghdadi took intensive military training for a whole year in the hands of Mossad, besides courses in theology and the art of speech. Prior Evidence of al-Baghdadi Link to Intelligence and Military Abu Bakr al-Baghdadi “took intensive military training for a whole year in the hands of Mossad, besides courses in theology and the art of speech,” the documents explain, according to Gulf Daily News, a Bahrainian source. In June a Jordanian official told Aaron Klein of WorldNetDaily ISIS members were trained in 2012 by U.S. instructors working at a secret base in Jordan. In 2012 it was reported the U.S., Turkey and Jordan were running a training base for the Syrian rebels in the Jordanian town of Safawi. VIDEO: http://www.youtube.com/watch?v=7FVywIgR0Ns There are only two known photographs of Abu Bakr al-Baghdadi, who now controls the most extreme Islamist army on earth. When the American military closed its Camp Bucca prison in Iraq, Baghdadi was handed over to Iraqi security forces, who let him go. Elizabeth Palmer reports. Corporate media has added weight to myth of Abu Bakr al-Baghdadi, repeatedly exposed as an intelligence asset. Al-Baghdadi was reportedly a “civilian internee” at Camp Bucca, a U.S. military detention facility near Umm Qasr, Iraq. James Skylar Gerrond, a former U.S. Air Force security forces officer and a compound commander at Camp Bucca in 2006 and 2007, said earlier this month the camp “created a pressure cooker for extremism.” “Circumstantial evidence suggests that al-Baghdadi may have been mind-controlled while held prisoner by the US military in Iraq,” writes Dr. Kevin Barrett. Creating a Fake Terror Threat The hornet’s nest strategy was designed to create the perception that Israel is threatened by an enemy near its borders. According to the personal diary of former Israeli prime minister Moshe Sharett, however, Israel never took seriously an Arab or Muslim threat to its national security. “Sharett’s diary reveals in explicit language that the Israeli political and military leadership never believed in any Arab danger to Israel,” writes Ralph Schoenman. “They sought to maneuver and force the Arab states into military confrontations which the Zionist leadership were certain of winning so Israel could carry out the destabilization of Arab regimes and the planned occupation of additional territory.” In 1982 Oded Yinon, an Israeli journalist with links to the Israeli Foreign Ministry, wrote The Zionist Plan for the Middle East. The white paper proposed “that all the Arab states should be broken down, by Israel, into small units” and the “dissolution of Syria and Iraq later on into ethnically or religiously unique areas such as in Lebanon, is Israel’s primary target on the Eastern front in the long run.” The destruction of the Arab and Muslim states, Yinon suggested, would be accomplished from within by exploiting their internal religious and ethnic tensions. For more background see our ISIS and the Plan to Balkanize the Middle East.
  3. http://rt.com/op-edge/168064-isis-terrorism-usa-cia-war/ ISIS in Iraq stinks of CIA/NATO ‘dirty war’ op William Engdahl is an award-winning geopolitical analyst and strategic risk consultant whose internationally best-selling books have been translated into thirteen foreign languages. Get short URL Published time: June 24, 2014 10:22 Iraqi Kurdish forces take position near Taza Khormato as they fight jihadist militants from the Islamic State of Iraq and the Levant (ISIL) positioned five kilometers away in Bashir, 20 kms south of Kirkuk (AFP Photo / Karim Sahib) 9.7K83175 Tags Intelligence, Iraq, Syria, Terrorism, USA For days now, since their dramatic June 10 taking of Mosul, Western mainstream media have been filled with horror stories of the military conquests in Iraq of the Islamic State in Iraq and Syria, with the curious acronym ISIS. ISIS, as in the ancient Egyptian cult of the goddess of fertility and magic. The media picture being presented adds up less and less. Details leaking out suggest that ISIS and the major military ‘surge’ in Iraq - and less so in neighboring Syria - is being shaped and controlled out of Langley, Virginia, and other CIA and Pentagon outposts as the next stage in spreading chaos in the world’s second-largest oil state, Iraq, as well as weakening the recent Syrian stabilization efforts. Strange factsThe very details of the ISIS military success in the key Iraqi oil center, Mosul, are suspect. According to well-informed Iraqi journalists, ISIS overran the strategic Mosul region, site of some of the world’s most prolific oilfields, with barely a shot fired in resistance. According to one report, residents of Tikrit reported remarkable displays of “soldiers handing over their weapons and uniforms peacefully to militants who ordinarily would have been expected to kill government soldiers on the spot.” We are told that ISIS masked psychopaths captured “arms and ammunition from the fleeing security forces” - arms and ammunition supplied by the American government. The offensive coincides with a successful campaign by ISIS in eastern Syria. According to Iraqi journalists, Sunni tribal chiefs in the region had been convinced to side with ISIS against the Shiite Al-Maliki government in Baghdad. They were promised a better deal under ISIS Sunni Sharia than with Baghdad anti-Sunni rule. According to the New York Times, the mastermind behind the ISIS military success is former Baath Party head and Saddam Hussein successor, General Ibrahim al-Douri. Douri is reportedly the head of the Iraqi rebel group Army of the Men of the Naqshbandi Order as well as the Supreme Command for Jihad and Liberation based on his longstanding positions of leadership in the Naqshbandi sect in Iraq. In 2009, US ‘Iraqi surge’ General David Petraeus, at the time heading the US Central Command, claimed to reporters that Douri was in Syria. Iraqi parliamentarians claimed he was in Qatar. The curious fact is that despite being on the US most wanted list since 2003, Douri has miraculously managed to avoid capture and now to return with a vengeance to retake huge parts of Sunni Iraq. Luck or well-placed friends in Washington? The financial backing for ISIS jihadists reportedly also comes from three of the closest US allies in the Sunni world—Kuwait, Qatar and Saudi Arabia. US passports?Key members of ISIS it now emerges were trained by US CIA and Special Forces command at a secret camp in Jordan in 2012, according to informed Jordanian officials. The US, Turkish and Jordanian intelligence were running a training base for the Syrian rebels in the Jordanian town of Safawi in the country’s northern desert region, conveniently near the borders to both Syria and Iraq. Saudi Arabia and Qatar, the two Gulf monarchies most involved in funding the war against Syria’s Assad, financed the Jordan ISIS training. Advertised publicly as training of ‘non-extremist’ Muslim jihadists to wage war against the Syrian Bashar Assad regime, the secret US training camps in Jordan and elsewhere have trained perhaps several thousand Muslim fighters in techniques of irregular warfare, sabotage and general terror. The claims by Washington that they took special care not to train ‘Salafist’ or jihadist extremists, is a joke. How do you test if a recruit is not a jihadist? Is there a special jihad DNA that the CIA doctors have discovered? Militants from the Islamic State of Iraq and the Levant (ISIL) parading with an Iraqi army vehicle in the northern city of Baiji in the in Salaheddin province. (AFP Photo / HO / Youtube) Jordanian government officials are revealing the details, in fear that the same ISIS terrorists that today are slashing heads of ‘infidels’ alongside the roadways of Mosul by the dozens, or hundreds if we believe their own propaganda, might turn their swords towards Jordan’s King Abdullah soon, to extend their budding Caliphate empire. Former US State Department official Andrew Doran wrote in the conservative National Review magazine that some ISIS warriors also hold US passports. Now, of course that doesn’t demonstrate and support by the Obama Administration. Hmm... Iranian journalist Sabah Zanganeh notes, "ISIS did not have the power to occupy and conquer Mosul by itself. What has happened is the result of security-intelligence collaborations of some regional countries with some extremist groups inside the Iraqi government." Iraq’s Chechen commanderThe next bizarre part of the ISIS puzzle involves the Jihadist credited with being the ‘military mastermind’ of the recent ISIS victories, Tarkhan Batirashvili. If his name doesn’t sound very Arabic, it’s because it’s not. Tarkhan Batrashvili is a Russian - actually an ethnic Chechen from near the Chechen border to Georgia. But to give himself a more Arabic flair, he also goes by the name Emir (what else?) Umar al Shishani. The problem is he doesn’t look at all Arabic. No dark swarthy black beard: rather a long red beard, a kind of Chechen Barbarossa. According to a November, 2013 report in The Wall Street Journal, Emir Umar or Batrashvili as you prefer, has made the wars in Syria and Iraq “into a geopolitical struggle between the US and Russia.” That has been the objective of leading neo-conservatives in the CIA, Pentagon and State Department all along. The CIA transported hundreds of Mujahideen Saudis and other foreign veterans of the 1980s Afghan war against the Soviets in Afghanistan into Chechnya to disrupt the struggling Russia in the early 1990s, particularly to sabotage the Russian oil pipeline running directly from Baku on the Caspian Sea into Russia. James Baker III and his friends in Anglo-American Big Oil had other plans. It was called the BTC pipeline, owned by a BP-US oil consortium and running through Tbilisi into NATO-member Turkey, free of Russian territory. Batrashvili is not renowned for taking care. Last year he was forced to apologize when he ordered his men to behead a wounded ‘enemy’ soldier who turned out to be an allied rebel commander. More than 8,000 foreign Jihadist mercenaries are reportedly in ISIS including at least 1,000 Chechens as well as Jihadists Saudi, Kuwait, Egypt and reportedly Chinese Uyghur from Xinjiang Province. Jeffrey Silverman, Georgia Bureau Chief for the US-based Veterans Today (VT) website, told me that Batrashvili “is a product of a joint program of the US through a front NGO called Jvari, which was set up by US Intelligence and the Georgian National Security Council, dating back to the early days of the Pankisi Gorge.” Jvari is the name as well of a famous Georgian Orthodox monastery of the 6th century. According to Silverman, David J. Smith—head of something in Tbilisi called the Georgian Foundation for Strategic and International Studies, as well as the Potomac Institute in Washington where he is listed as Director of the Potomac Institute Cyber Centerr—played a role in setting up the Jvari NGO. Silverman maintains that Jvari in Rustavi, near the capital, Tbilisi, gathered together Afghan Mujahideen war veterans, Chechens, Georgians and sundry Arab Jihadists. They were sent to the infamous Pankisi Gorge region, a kind-of no-man’s lawless area, for later deployment, including Iraq and Syria. Batrashvili and other Georgian and Chechen Russian-speaking Jihadists, Silverman notes, are typically smuggled, with the assistance of Georgia’s Counterintelligence Department and the approval of the US embassy, across the Georgia border to Turkey at the Vale crossing point, near Georgia’s Akhaltsikhe and the Turkish village of Türkgözü on the Turkish side of the Georgian border. From there it’s very little problem getting them through Turkey to either Mosul in Iraq or northeast Syria. Silverman believes that events in Northern Iraq relate to “wanting to have a Kurdish Republic separate from the Central government and this is all part of the New Great Game. It will serve US interests in both Turkey and Iraq, not to mention Syria.” Very revealing is the fact that almost two weeks after the dramatic fall of Mosul and the ‘capture’ by ISIS forces of the huge weapons and military vehicle resources provided by the US to the Iraqi army. Washington has done virtually nothing but make a few silly speeches about their ‘concern’ and dispatch 275 US special forces to allegedly protect US personnel in Iraq. Whatever the final details that emerge, what is clear in the days since the fall of Mosul is that some of the world’s largest oilfields in Iraq are suddenly held by Jihadists and no longer by an Iraqi government determined to increase the oil export significantly. More on this aspect in an upcoming article. More links: http://www.thedailybeast.com/articles/2014/06/14/america-s-allies-are-funding-isis.html http://www.crescent-online.net/2014/06/us-saudi-funded-isis-spreads-terror-in-iraq-crescent-onlinenet-4513-articles.html
  4. http://rt.com/news/intelligence-officials-nsa-leaker-452/ Alleged US security officials said NSA leaker, journalist should be 'disappeared' – report : June 10, 2013 10:46 Edited time: June 10, 2013 19:09 US National Security Agency whistleblower Edward Snowden is pictured during an interview with the Guardian in his hotel room in Hong Kong Sunday. The 29-year-old NSA contractor revealed top secret U.S. surveillance programs. (Reuters/Ewen MacAskill) A US editor has alleged he overheard security officials saying that the NSA leaker and the Guardian columnist who broke his story should be “disappeared.” Leaker Edward Snowden said that American spies often prefer silencing targets over due process. Follow RT's LIVE UPDATES on NSA leak fallout “In Dulles UAL lounge listening to 4 US intel officials saying loudly leaker & reporter on #NSA stuff should be disappeared recorded a bit,” the Atlantic's Washington-based editor-at-large Steve Clemons tweeted on Sunday. According to Clemons, four men sitting next to him at the airport “were loud. Almost bragging” while discussing an intelligence conference they had just attended hosted by the Intelligence and National Security Alliance. Clemens said he was unsure of the men's identities or which agency they worked for, and told the Huffington Post that one of them was wearing “a white knit national counter-terrorism center shirt.” Clemons also recorded part of their conversation and snapped some photos, hoping that “people in that bz will know them.” “But bad quality,” he noted about the quality of the photos. “Was a shock to me and wasn't prepared,” he wrote on Twitter. Clemons’ post immediately went viral, and his Twitter account was flooded with responses. While some users were anxious to learn more details and hear the conversation, others lashed out at the blogger, saying he should have verified the information before posting it. Clemons said his view on the “disappear” part was that the statement was one of “bravado” and a “joke” – but a very “disturbing” one. He said he felt obligated to make it public because he thought the speakers were senior intelligence officers. It was a “disconcerting set of comments offered in public,” Clemons explained. The blogger judged the speakers’ profession from the “context” of their conversation, as well as from the shirt one of them was wearing. Clemons is now working on an article detailing the conversation, but he said he will not publish it or the recording until he identifies the speakers and offers them a “fair chance to clarify” their remarks. Clemons has claimed that another person present at the time of the alleged conversation emailed him with the “same interpretation and concern” of the conversation. Snowden on tweet: ‘I am a spy and that is how they talk’ The source behind the revelation of the top-secret NSA surveillance program, dubbed one of the most significant intelligence leaks in US history, was uncovered late last week. Snowden, a former CIA technical contractor and NSA consultant, had asked the Guardian to reveal his identity. He has fled to Hong Kong in a bid to escape retaliation by the US. "The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards,” Snowden told the Guardian. When asked for his reaction to the alleged comments that reporter Glenn Greenwald and the 29-year-old leaker himself should be "disappeared," Snowden told the newspaper: "Someone responding to the story said 'real spies do not speak like that.' Well, I am a spy and that is how they talk. Whenever we had a debate in the office on how to handle crimes, they do not defend due process – they defend decisive action. They say it is better to kick someone out of a plane than let these people have a day in court. It is an authoritarian mindset in general." Snowden earlier explained that he had sacrificed his life and $200,000-a-year career out of his desire to protect "basic liberties" in order to “send a message to government that people will not be intimidated.” The whistleblower leaked top-secret documents that revealed the existence of the US National Security Agency’s extensive Internet spying program PRISM, which records digital communications and allows for real-time online surveillance of US citizens. PRISM apparently gives US intelligence agencies direct access to files stored on the servers of major Internet companies – including Google and Facebook – in order to identify and target potential terror suspects.
  5. http://www.zerohedge.com/contributed/2013-06-10/real-reason-government-spying-americans Is This the REAL Reason for the Government Spying On Americans? Submitted by George Washington on 06/10/2013 14:51 -0400 To understand the scope, extent and reason that the government spies on all Americans, you have to understand what has happened to our Constitutional form of government since 9/11. State of Emergency The United States has been in a declared state of emergency from September 2001, to the present. Specifically, on September 11, 2001, the government declared a state of emergency. That declared state of emergency was formally put in writing on 9/14/2001: A national emergency exists by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States. NOW, THEREFORE, I, GEORGE W. BUSH, President of the United States of America, by virtue of the authority vested in me as President by the Constitution and the laws of the United States, I hereby declare that the national emergency has existed since September 11, 2001 . . . That declared state of emergency has continued in full force and effect from 9/11 to the present. President Bush kept it in place, and President Obama has also. For example, on September 9, 2011, President Obama declared: CONTINUATION OF NATIONAL EMERGENCY DECLARED BY PROC. NO. 7463 Notice of President of the United States, dated Sept. 9, 2011, 76 F.R. 56633, provided: Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C. 1622(d), I am continuing for 1 year the national emergency previously declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on the United States. Because the terrorist threat continues, the national emergency declared on September 14, 2001, and the powers and authorities adopted to deal with that emergency must continue in effect beyond September 14, 2011. Therefore, I am continuing in effect for an additional year the national emergency that was declared on September 14, 2001, with respect to the terrorist threat. This notice shall be published in the Federal Register and transmitted to the Congress. The Washington Times wrote on September 18, 2001: Simply by proclaiming a national emergency on Friday, President Bush activated some 500 dormant legal provisions, including those allowing him to impose censorship and martial law. The White House has kept substantial information concerning its presidential proclamations and directives hidden from Congress. For example, according to Steven Aftergood of the Federation of American Scientists Project on Government Secrecy: Of the 54 National Security Presidential Directives issued by the [George W.] Bush Administration to date, the titles of only about half have been publicly identified. There is descriptive material or actual text in the public domain for only about a third. In other words, there are dozens of undisclosed Presidential directives that define U.S. national security policy and task government agencies, but whose substance is unknown either to the public or, as a rule, to Congress. Continuity of Government Continuity of Government (“COG”) measures were implemented on 9/11. For example, according to the 9/11 Commission Report, at page 38: At 9:59, an Air Force lieutenant colonel working in the White House Military Office joined the conference and stated he had just talked to Deputy National Security Advisor Stephen Hadley. The White House requested (1) the implementation of continuity of government measures, (2) fighter escorts for Air Force One, and (3) a fighter combat air patrol over Washington, D.C. Likewise, page 326 of the Report states: The secretary of defense directed the nation’s armed forces to Defense Condition 3, an increased state of military readiness. For the first time in history, all nonemergency civilian aircraft in the United States were grounded, stranding tens of thousands of passengers across the country. Contingency plans for the continuity of government and the evacuation of leaders had been implemented. The Washington Post notes that Vice President **** Cheney initiated the COG plan on 9/11: From the bunker, Cheney officially implemented the emergency continuity of government orders . . . (See also footnotes cited therein and this webpage.) CNN reported that – 6 months later – the plans were still in place: Because Bush has decided to leave the operation in place, agencies including the White House and top civilian Cabinet departments have rotated personnel involved, and are discussing ways to staff such a contingency operation under the assumption it will be in place indefinitely, this official said. Similarly, the Washington Post reported in March 2002 that “the shadow government has evolved into an indefinite precaution.” The same article goes on to state: Assessment of terrorist risks persuaded the White House to remake the program as a permanent feature of ‘the new reality, based on what the threat looks like,’ a senior decisionmaker said. As CBS pointed out, virtually none of the Congressional leadership knew that the COG had been implemented or was still in existence as of March 2002: Key congressional leaders say they didn’t know President Bush had established a “shadow government,” moving dozens of senior civilian managers to secret underground locations outside Washington to ensure that the federal government could survive a devastating terrorist attack on the nation’s capital, The Washington Post says in its Saturday editions. Senate Majority Leader Thomas A. Daschle (D-S.D.) told the Post he had not been informed by the White House about the role, location or even the existence of the shadow government that the administration began to deploy the morning of the Sept. 11 hijackings. An aide to House Minority Leader Richard A. Gephardt (D-Mo.) said he was also unaware of the administration’s move. Among Congress’s GOP leadership, aides to House Speaker J. Dennis Hastert (Ill.), second in line to succeed the president if he became incapacitated, and to Senate Minority Leader Trent Lott (Miss.) said they were not sure whether they knew. Aides to Sen. Robert C. Byrd (D-W. Va.) said he had not been told. As Senate president pro tempore, he is in line to become president after the House speaker. Similarly, the above-cited CNN article states: Senate Majority Leader Tom Daschle, D-South Dakota, said Friday he can’t say much about the plan. “We have not been informed at all about the role of the shadow government or its whereabouts or what particular responsibilities they have and when they would kick in, but we look forward to work with the administration to get additional information on that.” Indeed, the White House has specifically refused to share information about Continuity of Government plans with the Homeland Security Committee of the U.S. Congress, even though that Committee has proper security clearance to hear the full details of all COG plans. Specifically, in the summer 2007, Congressman Peter DeFazio, on the Homeland Security Committee (and so with proper security access to be briefed on COG issues), inquired about continuity of government plans, and was refused access. Indeed, DeFazio told Congress that the entire Homeland Security Committee of the U.S. Congress has been denied access to the plans by the White House. CLICK ON LINK FOR VIDEO: (Or here is the transcript). The Homeland Security Committee has full clearance to view all information about COG plans. DeFazio concluded: “Maybe the people who think there’s a conspiracy out there are right”. University of California Berkeley Professor Emeritus Peter Dale Scott points out that – whether or not COG plans are still in effect – the refusal of the executive branch to disclose their details to Congress means that the Constitutional system of checks and balances has already been gravely injured: If members of the Homeland Security Committee cannot enforce their right to read secret plans of the Executive Branch, then the systems of checks and balances established by the U.S. Constitution would seem to be failing. To put it another way, if the White House is successful in frustrating DeFazio, then Continuity of Government planning has arguably already superseded the Constitution as a higher authority. Indeed, continuity of government plans are specifically defined to do the following: Top leaders of the “new government” called for in the COG would entirely or largely go into hiding, and would govern in hidden locations Those within the new government would know what was going on. But those in the “old government” – that is, the one created by the framers of the Constitution – would not necessarily know the details of what was happening Normal laws and legal processes might largely be suspended, or superseded by secretive judicial forums The media might be ordered by strict laws – punishable by treason – to only promote stories authorized by the new government See this, this and this. Could the White House have maintained COG operations to the present day? I don’t know, but the following section from the above-cited CNN article is not very reassuring: Bush triggered the precautions in the hours after the September 11 strikes, and has left them in place because of continuing U.S. intelligence suggesting a possible threat. Concerns that al Qaeda could have gained access to a crude nuclear device “were a major factor” in the president’s decision, the official said. “The threat of some form of catastrophic event is the trigger,” this official said. This same official went on to say that the U.S. had no confirmation — “and no solid evidence” — that al Qaeda had such a nuclear device and also acknowledged that the “consensus” among top U.S. officials was that the prospect was “quite low.” Still, the officials said Bush and other top White House officials including Cheney were adamant that the government take precautions designed to make sure government functions ranging from civil defense to transportation and agricultural production could be managed in the event Washington was the target of a major strike. As is apparent from a brief review of the news, the government has, since 9/11, continuously stated that there is a terrorist threat of a nuclear device or dirty bomb. That alone infers that COG plans could, hypothetically, still be in effect, just like the state of emergency is still in effect and has never been listed. Indeed, President Bush said on December 17, 2005, 4 years after 9/11: The authorization I gave the National Security Agency after Sept. 11 helped address that problem in a way that is fully consistent with my constitutional responsibilities and authorities. The activities I have authorized make it more likely that killers like these 9/11 hijackers will be identified and located in time. And the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad. The activities I authorized are reviewed approximately every 45 days. Each review is based on a fresh intelligence assessment of terrorist threats to the continuity of our government and the threat of catastrophic damage to our homeland. During each assessment, previous activities under the authorization are reviewed. The review includes approval by our nation’s top legal officials, including the attorney general and the counsel to the president. I have reauthorized this program more than 30 times since the Sept. 11 attacks [45 days times 30 equals approximately 4 years] and I intend to do so for as long as our nation faces a continuing threat from Al Qaeda and related groups. The N.S.A.’s activities under this authorization are thoroughly reviewed by the Justice Department and N.S.A.’s top legal officials, including N.S.A.’s general counsel and inspector general. In other words, it appears that as of December 2005, COG plans had never been rescincded, but had been continously renewed every 45 days, and . In 2008, Tim Shorrock wrote at Salon: A contemporary version of the Continuity of Government program was put into play in the hours after the 9/11 terrorist attacks, when Vice President Cheney and senior members of Congress were dispersed to “undisclosed locations” to maintain government functions. It was during this emergency period, Hamilton and other former government officials believe, that President Bush may have authorized the NSA to begin actively using the Main Core database for domestic surveillance [more on Main Core below]. One indicator they cite is a statement by Bush in December 2005, after the New York Times had revealed the NSA’s warrantless wiretapping, in which he made a rare reference to the emergency program: The Justice Department’s legal reviews of the NSA activity, Bush said, were based on “fresh intelligence assessment of terrorist threats to the continuity of our government.” In 2007, President Bush issued Presidential Directive NSPD-51, which purported to change Continuity of Government plans. NSPD51 is odd because: NSPD51 was passed without Congressional input Even the New York Times wrote in an editorial: Beyond cases of actual insurrection, the President may now use military troops as a domestic police force in response to a natural disaster, a disease outbreak, terrorist attack, or to any ‘other condition.’ Changes of this magnitude should be made only after a thorough public airing. But these new Presidential powers were slipped into the law without hearings or public debate. Everyone from “conservative activist Jerome Corsi [to] Marjorie Cohn of the [liberal] National Lawyer’s Guild have interpreted [the COG plans contained in Presidential Directive NSPD-51] as a break from Constitutional law ….“ As a reporter for Slate concluded after analyzing NSPD-51: I see nothing in the [COG document entitled presidential directive NSPD51] to prevent even a “localized” forest fire or hurricane from giving the president the right to throw long-established constitutional government out the window White House spokesman Gordon Johndroe said that “because of the attacks of Sept. 11, 2001, the American public needs no explanation of [Continuity of Government] plans” This is all the more bizarre when you realize that COG plans were originally created solely to respond to a decapitating nuclear strike which killed our civilian leaders. (It was subsequently expanded decades before 9/11 into a multi-purpose plan by our good friends **** Cheney and Donald Rumsfeld. See this, this and this.) Does COG Explain the Pervasive Spying on Americans? 5 years ago, investigative reporter Christopher Ketcham disclosed the spying which was confirmed last week by whistleblower Edward Snowden: The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database. Given that Ketcham was proven right, let’s see what else he reported: Given that Ketcham was right about the basics, let’s hear what else the outstanding investigative journalist said in 2008: There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” *** According to one news report, even “national opposition to U.S. military invasion abroad” could be a trigger [for martial law ]. *** When COG plans are shrouded in extreme secrecy, effectively unregulated by Congress or the courts, and married to an overreaching surveillance state—as seems to be the case with Main Core—even sober observers must weigh whether the protections put in place by the federal government are becoming more dangerous to America than any outside threat. Another well-informed source—a former military operative regularly briefed by members of the intelligence community—says this particular program has roots going back at least to the 1980s and was set up with help from the Defense Intelligence Agency. He has been told that the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with “social network analysis” and artificial intelligence modeling tools. *** A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor antiwar protesters and environmental activists such as Greenpeace. *** If previous FEMA and FBI lists are any indication, the Main Core database includes dissidents and activists of various stripes, political and tax protesters, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people. A veteran CIA intelligence analyst who maintains active high-level clearances and serves as an advisor to the Department of Defense in the field of emerging technology tells Radar that during the 2004 hospital room drama, [current nominee to head the FBI, and former Deputy Attorney General] James Comey expressed concern over how this secret database was being used “to accumulate otherwise private data on non-targeted U.S. citizens for use at a future time.” [snowden and high-level NSA whistleblower William Binney have since confirmed this] …. A source regularly briefed by people inside the intelligence community adds: “Comey had discovered that President Bush had authorized NSA to use a highly classified and compartmentalized Continuity of Government database on Americans in computerized searches of its domestic intercepts. [Comey] had concluded that the use of that ‘Main Core’ database compromised the legality of the overall NSA domestic surveillance project.” *** The veteran CIA intelligence analyst notes that Comey’s suggestion that the offending elements of the program were dropped could be misleading: “Bush [may have gone ahead and] signed it as a National Intelligence Finding anyway.” But even if we never face a national emergency, the mere existence of the database is a matter of concern. “The capacity for future use of this information against the American people is so great as to be virtually unfathomable,” the senior government official says. In any case, mass watch lists of domestic citizens may do nothing to make us safer from terrorism. Jeff Jonas, chief scientist at IBM, a world-renowned expert in data mining, contends that such efforts won’t prevent terrorist conspiracies. “Because there is so little historical terrorist event data,” Jonas tells Radar, “there is not enough volume to create precise predictions.” *** [J. Edgar Hoover's] FBI “security index” was allegedly maintained and updated into the 1980s, when it was reportedly transferred to the control of none other than FEMA (though the FBI denied this at the time). FEMA, however—then known as the Federal Preparedness Agency—already had its own domestic surveillance system in place, according to a 1975 investigation by Senator John V. Tunney of California. Tunney, the son of heavyweight boxing champion Gene Tunney and the inspiration for Robert Redford’s character in the film The Candidate, found that the agency maintained electronic dossiers on at least 100,000 Americans that contained information gleaned from wide-ranging computerized surveillance. The database was located in the agency’s secret underground city at Mount Weather, near the town of Bluemont, Virginia. [One of the main headquarter of COG operations.] The senator’s findings were confirmed in a 1976 investigation by the Progressive magazine, which found that the Mount Weather computers “can obtain millions of pieces [of] information on the personal lives of American citizens by tapping the data stored at any of the 96 Federal Relocation Centers”—a reference to other classified facilities. According to the Progressive, Mount Weather’s databases were run “without any set of stated rules or regulations. Its surveillance program remains secret even from the leaders of the House and the Senate.” *** Wired magazine turned up additional damaging information, revealing in 1993 that [Oliver] North, operating from a secure White House site, allegedly employed a software database program called PROMIS (ostensibly as part of the REX 84 plan). PROMIS, which has a strange and controversial history, was designed to track individuals—prisoners, for example—by pulling together information from disparate databases into a single record. According to Wired, “Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States. Compared to PROMIS, Richard Nixon’s enemies list or Senator Joe McCarthy’s blacklist look downright crude.” Sources have suggested to Radar that government databases tracking Americans today, including Main Core, could still have PROMIS-based legacy code from the days when North was running his programs. *** Marty Lederman, a high-level official at the Department of Justice under Clinton, writing on a law blog last year, wondered, “How extreme were the programs they implemented [after 9/11]? How egregious was the lawbreaking?” Congress has tried, and mostly failed, to find out. *** “We are at the edge of a cliff and we’re about to fall off,” says constitutional lawyer and former Reagan administration official Bruce Fein. “To a national emergency planner, everybody looks like a danger to stability. There’s no doubt that Congress would have the authority to denounce all this—for example, to refuse to appropriate money for the preparation of a list of U.S. citizens to be detained in the event of martial law. But Congress is the invertebrate branch. *** UPDATE [from Ketcham]: Since this article went to press, several documents have emerged to suggest the story has longer legs than we thought. Most troubling among these is an October 2001 Justice Department memo that detailed the extra-constitutional powers the U.S. military might invoke during domestic operations following a terrorist attack. In the memo, John Yoo, then deputy assistant attorney general, “concluded that the Fourth Amendment had no application to domestic military operations.” (Yoo, as most readers know, is author of the infamous Torture Memo that, in bizarro fashion, rejiggers the definition of “legal” torture to allow pretty much anything short of murder.) In the October 2001 memo, Yoo refers to a classified DOJ document titled “Authority for Use of Military Force to Combat Terrorist Activities Within the United States.” According to the Associated Press, “Exactly what domestic military action was covered by the October memo is unclear. But federal documents indicate that the memo relates to the National Security Agency’s Terrorist Surveillance Program.” Attorney General John Mukasey last month refused to clarify before Congress whether the Yoo memo was still in force. Americans have the right to know whether a COG program is still in effect, and whether the spying on our phone calls and Internet usage stems from such COG plans. Indeed, 9/11 was a horrible blow, but it was not a decapitating nuclear strike on our leaders … so COG and the state of emergency should be lifted. If COG plans are not still in effect, we have the right to demand that “enemies lists” and spying capabilities developed for the purpose of responding to a nuclear war be discarded , as we have not been hit by nuclear weapons … and our civilian leaders – on Capital Hill, the White House, and the judiciary – are still alive and able to govern.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.