CIA

Pretexts and PNAC

By M.K. Styllinski

  “There is no telling how many wars it will take to secure freedom in the homeland.”

George W. Bush, speech on August 7, 2002


Hoodwinking the public into accepting wars is a very old tactic indeed. Under the tutelage of the British Empire, the United States of America has been one of the most violent “democracies” on earth. So-called US “interventions” as world policeman have been taking place in the most vulnerable regions of the world for well over one hundred years. Given that most of the so-called threats against Western democracy are either a) weak and debt-ridden countries; b) installed with a US-NATO proxy dictator and c) ripe for resource picking, it comes as no surprise that a huge back lash is taking place against Anglo-American hegemony. America and Britain’s record of invasion doesn’t stack up with the “axis-of-evil” regimes such as Iran who have never attacked anyone in over 200 years.

bush-rove

Another overshadowing Iago: Karl Rove

There was a reason that the Bush Administration’s then Senior Advisor and Deputy Chief of Staff Karl Rove had on his desk copies of The Prince by Nicolo Machiavelli and The Art of War by Sun Tzu: they are  both classics in the psychology of deception and tactics of military warfare, something dear to this man’s shrivelled heart. This was the same senior advisor of the most powerful man who believes in the idea of a “reality-based community,” or that “… solutions emerge from your judicious study of discernible reality.” Rather like his colleague Michael Leeden, another Neo-Conservative authoritarian who believes in deception and lies as a way to gain the upper hand. (More on Leeden in a later post).

Rove seems to be a fine example of political psychopathy which advocates an entirely subjective reality based on Empire-desire where reality is what you make it.

Or in his own words: 

“That’s not the way the world really works anymore,” …“We’re an empire now, and when we act, we create our own reality. And while you’re studying that reality—judiciously, as you will—we’ll act again, creating other new realities, which you can study too, and that’s how things will sort out. We’re history’s actors…and you, all of you, will be left to just study what we do.” [1]

Government-sponsored terrorism or “synthetic terror” has been a part of warfare since before Sun Tzu’s Art of War from the 6th Century BC. If the enemy is too large then the abiding manoeuvre is always to divide in order to conquer. Since “All warfare is based on deception” it stands to reason that secrecy under the guise of freedom must underlie all operations, where future plans are as:

“… dark and impenetrable as night …” and where the public are programmed to: “Engage … with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.” [2]

The September 11th attacks was one such moment.

The focus of deception was gradually transferred from the battle-field and mercenary colonialism to the civilian populations as targets. Western democracy began to rise through electoral politics and International banking and their weapons manufacturers had to move with the times by using propaganda and social science to deliver jingoistic consent for globalism. After all, if a British or American Empire is seeking new countries to invade, convert and exploit you need a ready supply of willing young men to die for it.

From the British Empire to Pax Americana, once the belief that “God is on our side” is promoted as self-evident through the progress of power, then targeted countries inhabited by “savages”, “communists” or “Islamists” are then cultivated and demonised as “evil,” the beliefs systems of which have been purposely assisted to manifest extremes in order to make it easy for the mass mind. Bombing and black ops can begin so that Christian democracy can elevate a backward nation and control its destiny for resource management. The public consciousness is then flooded with propaganda in press, film and chat shows to “stiffen the sinews” and “conjure up the blood” so that they might find themselves in a condition of self-righteous indignation and actually demand that their governments take action. It becomes as easy to equate the Sandinistas of Nicaragua with an insidious plot to topple American freedoms as it is to fuse Osama bin Laden with Saddam Hussein and weapons of mass destructions with Iraq.

US-Israeli hegemony steered by the hidden hand of British banking interests has made the business of neo-imperialism the number one reason for conflict in the world. As long as the cosy relationship with arms manufacturers and US defence Dept. continues to buy Congress, which in turn, restricts any alternative economic models then the Empire can continue to expand under the guise of “intervention.”

So, why the constant reference to pearl harbour when people mention the Neo-Cons and 9/11?

Lt. Commander Arthur H. McCollum, head of the Far East desk of the Office of Naval Intelligence designed an eight step plan for President Franklin Delano Roosevelt in order to provoke an attack from Japan and thus involve the United States in the War. The October 1940 memorandum called for an economic embargo, stopping weapons shipments to Japan’s adversaries and the blockade of Tokyo’s ports preventing access to essential raw materials. This could only lead to a confrontation with America.

The FDR government and the US Navy had foreknowledge of the attack in much the same way as factions within the Bush Administration and related shadow government agencies knew about 9/11 and perhaps had a hand in its planning.  US cables tracked the Japanese fleet to Pearl Harbour, keeping tabs on its course right up to the “surprise attack”. While top US Navy personnel were barred from accessing intelligence reports regarding the approach of the Japanese destroyers and their pilots. The deaths of over three thousand American service men; massive destruction of the US Navy fleet and the transformation from huge public resistance to the war to unbridled horror and outrage at such a dastardly act, ensured entry into the War, central to US dominance in the Asia-Pacific. [3]

PNAC_logo

The Project for a New American Century (PNAC) was an American think tank with a blueprint for a contemporary Pearl Harbour writ large in Neo-Conservative lettering. PNAC signatories and members included Florida governor Jeb Bush; Cheney’s chief of staff, I. Lewis “Scooter” Libby, who was indicted for perjury in October 2005; Elliot Abrams, who became Bush’s top Middle East aide at the National Security Council; John Bolton, Bruce Jackson, Norman Podhoretz, Donald Rumsfeld, Paul Wolfowitz, Dr. Dov S. Zakheim, chairman William Kristol, directors Robert Kagan and the Dark lord Dick Cheney himself, were all hawks desperate for perpetual war as policy.

PNAC’s 1997 statement of principles wished to remind Americans of past “lessons” and “consequences” which called for a “Reaganite policy of military strength and moral clarity.” Signatories believed: “we need to increase spending significantly if we are to carry out our global responsibilities today and modernize our armed forces for the future.”

Reading beneath the euphemistic verbiage, it means they desperately wished to increase defence expenditure in order to float their imperialistic visions or in other words : “strengthen our ties to democratic allies and to challenge regimes hostile to our interests and values.” This translates as power-sharing with countries who think the same, but only insofar as it supports their objectives for global dominance. Regime change equates to “challenging” nations which do not agree with US foreign policy having little to do with humanitarian and democratic values. Thus the: “need to promote the cause of political and economic freedom abroad” means an expansion of covert strategic, tactical and psychological operations or “dirty tricks.” This is all wrapped up in the polite, civilised language of politicians seeking only a benign form of interventionism which actually masks a ponerological injunction of decidedly grim intentions. They state a: “need to accept responsibility for America’s unique role in preserving and extending an international order friendly to our security, our prosperity, and our principles.” [4]

The term “Neo-Conservatism” was coined by political scientist Michael Harrington in the mid 1970s to describe a new form of conservatism which incorporated elements of intellectual liberalism and socialist principles. It claimed to be anti-Utopian yet was even further removed from the pragmatism and reality consensus it professed to embody. Jewish Intellectual and former Trotskyist Irving Kristol has been dubbed the “godfather” of Neo-Conservatism and generally recognised as being responsible for its genesis. As discussed in the World State Policies  and World Revolution series, Neo-Conservatism is an exact fusion of Fabian socialism, Keynesian/neo-liberal economics and the ideology of international revolution suffused with a Christian Zionist bias. In other words, it is a new form of neo-fascism most obviously through the complete corporatisation of the State which is then exported internationally through the geopolitics of coloured revolutions. It is little wonder it has attracted turbo-charged psychopaths like bees to honey. It is political psychopathy writ large, or as exactly as psychologist Andrew M. Lobaczewski described such channels of pathology in the title of his profoundly important book: Political Ponerology: The Science of the Nature of Evil Adjusted for Political Purposes. 

kristol1

Irving Kristol circa 1965

Getting high on Irving Kristol’s intellectual justification for a new kind of conservatism wasn’t the only major influence for the rise of Neo-Conservatism and the subsequent formation of PNAC. A bedrock of inspiration and ideology can be found in an 1999 essay called “Leo Strauss and the World of Intelligence (by Which we do not mean Nous)” written by Neo-Conservative academic Abram Shulsky and PNAC co-founder Gary Schmitt. Both of these intellectuals studied under the Jewish political philosopher Leo Strauss who arrived in the United States in 1938 and a key figure in Neo-Conservative ideology. Given that he believed that all intelligence work comprises of deception and counter-deception across governments and society at large, the essay can be seen as a subtle exercise in the importance of understanding the vagaries of cultural differences assigned to “regimes” and how such knowledge could institute a form of change. It doesn’t take an academic’s mind to reveal that the type of change sought for is distinctly fascist in flavour,  with a high proportion of its advocates straddling both Zionist and Conservative Establishment circles. Thus, “Zio-Conservatives” is often a more appropriate label.

Kristol maintains, it is not an ideology but a “persuasion,” a way of thinking about politics rather than a compendium of principles and axioms. [5] The importance of concealing one’s true intentions from the public while informing the party faithful with coded words is also a part of the the art of deception. In terms of polity and the intelligence apparatus, it has never been clearer that this is the only thing that mattered. Necessity is not the mother of invention for Neo-Conservatives; rather necessity gives birth to deception as a means to policy ends. [6]

Schmitt and Shulsky admit that political life: “… may be closely linked to deception. Indeed, it suggests that deception is the norm in political life, and the hope, to say nothing of the expectation, of establishing a politics that can dispense with it is the exception.” So, they chose to embrace this deception fully and completely,  which is hardly a surprise given that Strauss was an advocate of secrecy, hierarchy and Elite authoritarianism where the psychology of leaders was of little consequence.

Straussian principles of “Might is Right” and the “Ends justify the Means” is music to the ears of authoritarian personalities which channel their frustrated energies into modern think-tanks, much like PNAC forerunner. Secular democracy was contemptuous for Strauss and in true authoritarian form he believed in the fusion of Church and State as a means to exert control over the masses, but not necessarily to prop up any religious belief in the architects themselves. Ordinary people once again, are seen as a mass of uncontrolled instinct to be sternly managed by Papa Strauss.

leostrauss

Leo Strauss

And this brings us back to Pearl Harbour. What is perhaps most telling in the context of 911 and PNAC is the Machiavellian nature of Straussian belief which was twisted into something beyond the mere philosophical. Shadia B. Dury Professor of political science at the University of Calgary and author of Leo Strauss and the American Right (1999) states: “Perpetual war, not perpetual peace, is what Straussians believe in,” which stems from Strauss’s belief: “… that a political order can be stable only if it is united by an external threat,”… he maintained that “if no external threat exists then one has to be manufactured.[7]

Military pre-eminence via the changing face of technology is the subject explored in the figurehead document of PNAC which we have mentioned before: “Rebuilding America’s Defenses” (1997) and which discusses “… the process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event – like a new Pearl Harbor”. The Pearl Harbour event is mentioned again later on in the document: “Absent a rigorous program of experimentation to investigate the nature of the revolution in military affairs as it applies to war at sea, the Navy might face a future Pearl Harbor – as unprepared for war in the post-carrier era as it was unprepared for war at the dawn of the carrier age”. [8]

Though the emphasis is on the unpreparedness of military technology, when taken with Neo-Conservative politicising as a whole, this is merely cover for a pre-emptive doctrine which, if not signalling a nudge and a wink towards the planning of a monumental false-flag operation of which only a select handful may have been aware, then it was the tacit support of such a scenario, should the opportunity present itself.

911-terrorist-attack-Pearl_harbour

9/11: The New Pearl Harbour?

From banking, think-tanks and the military the same script is being followed. The reference to “catastrophic and catalyzing event” can be found by arch-esoteric writer for the Elite crowd Zbigniew Brzezinski in his book, The Grand Chessboard and his discussion on America where he states: “… it may find it more difficult to fashion a consensus on foreign policy issues, except in the circumstances of a truly massive and widely perceived direct external threat.” This is no throw-away comment coming from one of the creators of the Al-Qaeda network, alongside the CIA involvement in the Soviet-Afghan conflict. Tracing this meme further, we can find his comrade David Rockefeller in an address to the United Nations Business Council in 1994 touting the same fervent desire: “We are on the verge of global transformation. All we need is the right major crisis and the nations will accept the New World Order.”

execu3

Executive laws laid down by the Bush Administration and ready to enforce for President Barack Obama (click on above text for greater resolution) Source: Infrakshun.

Following the PATRIOT Act and PATRIOT Act II was the Home Security Act which was recently updated by former human rights lawyer President Barack Obama. The executive orders currently in the Federal Register can be passed without a whiff of red tape should a National emergency suddenly materialize. And most importantly, prior congressional approval is not needed for such directives – they are instantly effective once the National Emergency is implemented.

The body responsible for enforcing these orders is the Federal Emergency Management Agency (FEMA) which has long been recognized as being a whole lot more than just an administrative agency during times of environmental disaster or National emergency. In fact, it has the most extraordinary capabilities that would leave any dictator beaming with anticipation. The true nature of FEMA has been nurtured for its role in overseeing the coming police state by branches of a Shadow Government that have been working steadily behind the scenes in conjunction with the military to ensure that a potent National Emergency can be engineered as part of the Plan for World Order. These branches include the National Security Council, Joint Chiefs of Staff and the National Program Office, all of which have an interesting history of deception. FEMA is a hermetically sealed symbol of totalitarian muscle, answering only to the National Security council, which in turn answers only to the Shadow Government.

100_3257© infrakshun

Executive laws are immediately enforceable but they cannot be restricted or altered by any department or individual – not even congress. If we follow the narrative from commentators in the last ten years from all sides of the political divide are we to expect, at some point in the future, a “terrorist attack” on Congress? Striking at the heart of a perceived democracy would put paid to any ideological resistance at home, and to certain degree, abroad. Remarkably, there already exists a commission to take over in the event of all or most of congress somehow being unable to fulfil their civic duty. Ingeniously named the “Continuity of Government Commission” they had this to say on their main page:

“In the fall of 2002, the Continuity of Government Commission was launched to study and make recommendations for the continuity of our government institutions after a catastrophic attack. September 11th raises the possibility that foreign enemies might seriously disrupt the filling of vacancies in Congress, presidential succession, and achieving a quorum for the Court so much so that our basic institutions might not function in a normal constitutional manner.” [9]

Behind these apparently measured PNAC proposals was masked a virulent form of war-mongering. In January 1998, PNAC published an open letter to President Clinton urging “the removal of Saddam Hussein’s regime from power”, by military force if necessary in order to protect: “… our vital interests in the Gulf.” Clinton, running along more Fabian lines did not like to be pressured by anyone, least of all the Zio-Cons who were commonly known by lower level CIA personnel as the “Crazies.” Nevertheless, these signatories which included Abrams, Rumsfeld, Wolfowitz, Richard Armitage, and U.N. ambassador John Bolton went on to become the main backers of the 2003 genocide in Iraq and their dreams of conquest. [10]

A few days after the 9/11 attacks, a PNAC letter pressured President Bush to extend the parameters of engagement regarding the War on Terror by including Saddam Hussein and Lebanon’s Hezbollah. The need to encompass any and all – even if entirely unconnected – was a driving force in the minds of PNAC members. So, too were the groups true colours revealed in relation to the prevalence of Zionism and its agents. In an April 2002 letter to Bush on Israel, Yasser Arafat and the Palestinian Authority (PA) were deemed “a cog in the machine of Middle East terrorism,” and that America must therefore end support for not only the PA but the Israeli-Palestinian peace process itself. And peace is the last thing Zio-Conservatism wishes to see, being counter to the policy of perpetual war and the theocracy of Zionist visions.  PNAC members wrote that: “Israel’s fight against terrorism is our fight,” calling for Bush to “accelerate plans for removing Saddam Hussein from power.” [11]

Though The Project for a New American Century hung up its armchair warmongering in 2006 in part due to bad press, it was unlikely that Neo-Con hawks would simply fade into the background. True to form, Son of PNAC made its debut in 2009 yawningly named The Foreign Policy Initiative (FPI) founded by the same Straussians William Kristol, Robert Kagan and former Bush minion Don Senor. Unbelievably, the faintest whisper of humility and caution was notably absent when it sponsored a conference pushing for a U.S. “surge” in Afghanistan and a greater involvement of the US military in the country. As reporters Daniel Luban and Jim Lobe write: “… the formation of FPI may be a sign that its founders hope once again to incubate a more aggressive foreign policy during their exile from the White House, in preparation for the next time they return to political power.” [12]

They have never left however. A May 2010 report (PDF) from the a Washington, DC think tank, Brookings Institute state quite clearly that Neo-Conservatives such as former Assistant Secretary of Defense Paul Wolfowitz, Irving Kristol’s son Bill Kristol and writer and former politician Richard Perle are working their (black) magic within the Obama Administration.

Keep in mind that just because a fusion between certain elements of the Three Establishment Model (3EM) defined the 1990s and early 2000s does not mean the pathology behind it has suddenly been replaced. Obviously, no such redemption was forthcoming since Obama-Biden administration has brought with it the same strains of pathology with even more disasterous results. That ideological baton has merely been passed to the Liberal Establishment who have exactly the same objectives of globalism as the Conservatives and Zionist arms, they just differ in the means to get there. Once again, what is at stake here is the choice, not between different parties or ideologies – that is an illusion – but the choice between a world locked into a perpetual high-level psychopathy that normalises greed, hatred and destruction to erode the human spirit, or the clawing back of a state of equilibrium where such extreme negativity is called out for what it is – evil. As the US police state gains momentum it seems that they are, once again, a step closer to their ideal.

For the PNAC and FPI teams the September 11th Attacks were so well timed it was miraculous.

The question is, do you believe in miracles?

 


Notes

[1] ‘Faith, Certainty and the Presidency of George W. Bush’. By Ron Suskind, The New York Times Magazine.October 17 2004.
[2] Sun Tzu, The Art of War, Ch. VII.
[3] Day of Deceit: The Truth About FDR and Pearl Harbor By Robert Stinnett. Published by The Free Press, First Edition, 1999. ISBN-10: 0684853396.
[4] http://www.newamericancentury.org/statementofprinciples.htm
[5]‘Leo Strauss and the World of Intelligence (by Which We Do Not Mean Nous)’ by Gary J. Schmitt and Abram N. Shulsky 1999.
[5] Ibid.
[6] ‘Leo Strauss’ Philosophy of Deception’ By Jim Lobe, AlterNet, May 18, 2003. | Leo Strauss and the American Right by Shadia B. Drury, 1999. Published by Palgrave MacMillan ISBN-10: 0312217838.
[7] PNAC, Rebuilding America’s Defenses ( p.51) | Ibid. (p.53)
[8] Continuity of Government: Current Federal Arrangements and the Future Harold C. Relyea Specialist in American National Government Government and Finance Division: http://www.fas.org/sgp/crs/secrecy/RS21089.pdf
[9] PNAC Letter to President Clinton on Iraq, January 26, 1998 -www.newamericancentury.org/lettersstatements.htm
[10] PNAC Letter to President Bush on Israel, Arafat and the War on Terrorism, April 3, 2002. http://www.newamericancentury.org/lettersstatements.htm
[11] ‘Neo-Con Ideologues Launch New Foreign Policy Group’ By Jim Lobe and Daniel Luban, Inter Press Service News Agency http://www.ips.net

WTC Building 7

By M.K. Styllinski

“This is a controlled demolition which was carried out by a team of experts.”

– the late Danny Jowenko, demolition expert, making the comment before he was told he was watching a video of the destruction of WTC building 7.


One of the most outrageous events of September 11th and even harder to explain using the official story is the destruction of one of New York City’s larger sky-scrapers, the 47 story Building 7, part of the WTC complex and which occupied an entire city block, it’s height reaching 600ft above street level. Whereas the Twin Towers exhibited an array of strange anomalies, Building 7 imploded in a manner wholly indistinguishable from a conventional building demolition.

According to a Zogby poll in 2006, 43 percent of Americans didn’t even know Building 7 existed, let alone that it was destroyed. What the public also may not know is that no plane hit the building, suffering only minimal damage after the destruction of the Twin Towers. By 2011, Siena Research Institute Poll commissioned by “Remember Building 7” Campaign showed that there was substantial skeptism about the official story. Almost half of the 643 New Yorkers polled were in favour of a new investigation into WTC 7’s collapse. Amidst the constant stream of propaganda-saturated media pumped into American living-rooms every day this is a significant rise in awareness.

The World Trade Centre complex buildings 3, 4, 5, and 6 were damaged more severely than Building 7; firstly, by falling rubble from the tower collapses, and then from fires which burned for hours on various floors. None of these buildings decided to implode. WTC 7 fell into its own footprint at 5.20pm on September 11th with a precision even more characteristic of a controlled demolition than the Twin Towers. No other explanation can account for this scenario unless it was simply the most mysterious, catastrophic structural failure in history. In which case, the laws of physics will have to be quickly re-written. Persistent attempts by the MSM to paint this destruction due to intense fires the evidence simply doesn’t add up.

wtc71-8

Sequential stills from the collapse of WTC 7 from video footage: ttps://www.youtube.com/

wtc7_collapse2_s

Watch a 9.6 sec. quick-time video from CBS News: (click on the image)

The official line is that these fires continued to burn throughout the afternoon on the lower floors due to the building’s  suppression system lacking water pressure to fight the fires, causing a collapse at 5:21 pm. This is said to have combined with the failure of a major internal column which buckled triggering a structural failure throughout, the visible signs of which can be seen in video footage of a rooftop penthouse structure crumbling at 5:20 pm. [1]

On the morning of September 11, 2001, the late Barry Jennings, a City Housing Authority worker and Michael Hess, New York̵ corporation counsel, became trapped inside Building 7. After trying to find their way down from the 23rd floor during a power outage they both heard what sounded like loud explosions below them when they reached the eight and then the sixth floors of the building. These were heard before 9:59am when the Twin Towers were still standing. Hess and Jennings were rescued by fire-fighters later that day. [2]

Confirming the story of Jennings and Hess, another eyewitness Craig Bartmer, Former NYPD, and 9/11 First Responder gave a vivid account of the WTC 7 as it fell into its own footprint:

“All of a sudden, the radios exploded and everybody started screaming, ‘Get away, get away, get away from it!’ And, I was like a deer in the headlights. And I looked up, and…Two guys that I knew were on the transit radio. I don’t know if those tapes are out there… And I looked up, and it was nothing I would ever imagine seeing in my life. You know the thing started peeling in on itself and, I mean there was an umbrella of crap seven feet over my head that I just stared at. Somebody grabbed my shoulder and I started running, and the shit’s hitting the ground behind me. And the whole time you’re hearing, ‘THOOM! THOOM! THOOM! THOOM! THOOM!’ So, I, I think I know an explosion when I hear it, you know? So yeah, I wanna know what took that building down. I don’t think it was a fire and it certainly wasn’t a plane…It had some damage to it but nothing like what they’re saying…I am shocked at the[official] story we’ve heard about it, to be quite honest.” [3]

Eyewitness Kevin McPadden, Emergency Medical Technician, and 9/11 First Responder had a similar story to tell:

“And, at the last few seconds, he took his hand off [the radio] and you heard “3-2-1”, and he was just saying, ‘Just run for your life, just run for your life.’ And then it was like another two, three seconds, you heard explosions. Like BA-BOOOOOM! And it’s like a distinct sound…BA-BOOOOOM! And you felt a rumble in the ground, like, almost like you wanted to grab onto something. That, to me, I knew that was an explosion. There was no doubt in my mind.” [4]

Just as it was in the case of the Twin Towers, the matter of a 100 steel-framed, high-rise fires which have occurred in the past not one building has ever collapsed. The conundrum also applies to Building 7. How the sky-scraper instantly went from full support to zero support was a matter that the NIST didn’t want to explore, despite its remit to do so. While initially claiming that WTC 7 collapsed slower than free-fall acceleration, it later confirmed the obvious due to pressure from certain members of the public. In the final report in November 2008, the “… free fall drop continued for approximately 8 stories, or 32.0 meters (105 ft.), the distance traveled between times t = 1.75 s and t = 4.0 s [a period of 2.25 seconds]” with the final duration at 6.5 seconds. Tellingly however, the NIST did not include why Building 7’s 2.25 second collapse could have occurred. To do so, would have meant deviating from the official conspiracy theory. [5]

wtc_diagram

Plan of the World Trade Centre | Source: University of Maryland at www.terpconnect.umd.edu/

The interested member of the public who took NIST to task was a Mr. Chandler who explained what the free-fall really meant: “The collapse we see cannot be due to a column failure, or a few column failures, or a sequence of column failures. All 24 interior columns and 58 perimeter columns had to have been removed over the span of 8 floors low in the building simultaneously to within a small fraction of a second, and in such a way that the top half of the building remains intact and uncrumpled.” [6]  A steel-cored, 47- story sky-scraper untouched by aeroplane impact and with minimal damage and limited fires decided to collapse in a uniform, symmetrical fashion through the path of greatest resistance – with 40,000 tons of steel designed to resist this load – straight down into its own footprint in just 6.5 seconds and still people have a hard time considering that only explosives could achieve such a result.

Release 41 DSCF0058

Photo taken 9/12 – Image source: FOIA documents release 41

Head of Architects and Engineers for 9/11 Truth, Richard Gage is in no doubt that the fires and the temperatures achieved in Building 7 fell far short of the required heat to melt steel: “Such temperatures cannot be achieved by oxygen-starved hydrocarbon fires. Such fires burn at only 600 to 800° F”. [7] Gage also draws our attention to the evidence of: “… mistimed explosions (squibs?) at the upper seven floors on the network video recordings of the collapse. And we have expert testimony from a European demolitions expert, Danny Jowenko, who said ‘This is controlled demolition… a team of experts did this… This is professional work, without any doubt.’ ” [8] (More from Jowenko later).

Parallel to this conclusion and similar to the Twin Towers, evidence recorded on video at the base of WTC 7 confirm reports from fire department personnel who saw: “molten steel running down the channel rails … like you’re in a foundry – like lava from a volcano.” [9] Gage continues: “Appendix C of FEMA’s BPAT Report … documents steel samples showing rapid oxidation, sulfidation, and intergranular melting. A liquid eutectic mixture, including sulfur from an unknown source, caused intense corrosion of the steel, gaping holes in wide flange beams, and the thinning of half-inch-thick flanges to almost razor-sharpness in the World Trade Center 7 steel. The New York Times called this ‘ the deepest mystery uncovered in the investigation.’ ” [10]

None of this was addressed in any of the NIST reports. International experts weren’t consulted either, despite their reservations about NIST conclusions. Even their very own former head of the Fire Science Division of NIST and one of the world’s leading fire science researchers and safety engineers, Dr. James Quintiere Ph.D., called for an independent review of the World Trade Centre Twin Tower collapse investigation and referring to the NIST investigation: “I wish that there would be a peer review of this, I think all the records that NIST has assembled should be archived. I would really like to see someone else take a look at what they’ve done; both structurally and from a fire point of view … I think the official conclusion that NIST arrived at is questionable.”

WTC 7

Image source: FOIA documents release 16

Kamal S. Obeid, a structural engineer, with a master’s degree in Engineering from UC Berkeley, of Fremont, California, stated: “Photos of the steel, evidence about how the buildings collapsed, the unexplainable collapse of WTC 7, evidence of thermite in the debris as well as several other red flags, are quite troubling indications of well-planned and controlled demolition.” [11]

One of Europe’s top demolition experts was Dutch-born Danny Jowenko. His reaction to seeing WTC7 collapse was shown in a widely seen video. Before being told that it was the WTC 7 building that he was seeing, Jowenko was in no doubt whatsoever that what he was watching “…was a controlled demolition carried out by a team of experts.” [12] When he is informed that the collapse happened on September 11th later that very same day, his shock is palpable. The demolition expert asked repeatedly “De zelfde dag??” (The same day?) As the video of the collapse plays out Jowenko searched for an explanation and told his interviewer that someone must have wired the whole WTC towers for demolition in a few hours though it is clear his facial expression and body language shows that he doesn’t really believe it himself. When the interviewer informed him that FEMA excluded the possibility of a controlled demolition as an explanation for WTC7’s collapse it is then that Jowenko begins to process what this means. [13]

WTC 7 aftermath

Image source: FOIA documents release 13

In a later 2006, telephone interview with journalist Jeff Hill, Jowenko was convinced that there was a cover up and that a highly sophisticated controlled demolition did in fact, take place. The fear and self-censorship related to the issue is the deciding factor. Here is a small snippet of the entire interview:

Jeff Hill: Are you still sticking by your comments where you say it must have been a controlled demolition?

Danny Jowenko: Absolutely.

Jeff Hill: Yes? So, you as being a controlled demolitions expert, you’ve looked at the building, you’ve looked at the video and you’ve determined with your expertise that —

Danny Jowenko: I looked at the drawings, the construction and it couldn’t be done by fire. So, no, absolutely not.

Jeff Hill: OK, ’cause I was reading on the Internet, people were asking about you and they said, I wonder — I heard something that Danny Jowenko retracted his statement of what he said earlier about World Trade Center 7 now saying that it came down by fire. I said, “There’s no way that’s true.”

Danny Jowenko: No, no, no, absolutely not.

Jeff Hill: ‘Cause if anybody was — Like when I called Controlled Demolition here in North America, they tell me that , “Oh, it’s possible it came down from fire” and this and that and stuff like that –.

Danny Jowenko: When the FEMA makes a report that it came down by fire, and you have to earn your money in the States as a controlled demolition company and you say, “No, it was a controlled demolition”, you’re gone. You know?

Danny_Jowenko

“Jowenko gained further notoriety when former Director of Studies at the US Army War College, Dr. Alan Sabrosky, said in a radio interview in 2010, that his skepticism of the official 911 story was prompted by Jowenko’s testimony. Jowenko’s death comes three days after Sabrosky gave an exclusive interview to PressTV (Danny Jowenko 1955-2011)

Jeff Hill: Yeah, exactly, you’ll be in a lot of trouble if you say that, right?

Danny Jowenko: Of course, of course. That’s the end of your — the end of the story.

Jeff Hill: Yeah, ’cause I was calling demolitions companies just to ask them if they used the term, “Pull it” in demolition terms and even Controlled Demolitions, Incorporated said they did. But the other people wouldn’t — didn’t want to talk to me about Building 7 really because obviously ’cause they knew what happened and they didn’t want to say it.

Danny Jowenko: Exactly. [14]

Danny Jowenko died in a car accident in July 2011.

When the Twin Towers remains were rapidly sold off to scrap merchants the exact same thing happened to the rubble of Building 7 with safety protocol and crime scene forensics ignored. Building 7 was destined for the blast furnaces by high level directives. All the clues as to why such as powerful building would just decide to collapse vanished with the scrap merchants, to be melted down so that nothing would ever be traceable. Unlike the Twin Towers, everyone had been evacuated so there was no reason not to document and catalogue each piece for further study. And since the collapse neatly conformed to a text book demolition other streets were relatively untouched providing easy access and a reduced possibility of disruption to the immediate area.

Along with family members, safety officials and just about anyone paying attention, Dr. Frederick W. Mowrer, an associate professor in the Fire Protection Engineering Department at the University of Maryland, added his voice to the actions of FEMA claiming: “I find the speed with which potentially important evidence has been removed and recycled to be appalling.” [15] Which brings us to WTC owner Mr. Larry Silverstein, who must have been positively jumping for joy at the supernatural “luck” he enjoyed on September 11.


 “Of course, we all wish we could have gotten it done a lot faster.”

– Larry Silverstein on Sep 09, 2014 after the completion of the lower Manhattan revival


On July 24, 2001, just seven weeks before the attacks, Larry and his Silverstein Properties signed a $3.2 billion deal to purchase a 99-year lease on the WTC complex including the Twin Towers, World Trade Centre Buildings 4 and 5 (two nine-story office buildings), and about 425,000 square feet of retail space. It was the first time that the WTC was placed under private control in its 33 year history. Silverstein made a down-payment of $124 million and quickly insured it for $3.6 billion. In this insurance contract he was conveniently covered against “terrorist attacks” and specifically given the right to rebuild the structures if they were destroyed. What makes this move doubly suspicious is that the building itself was worth considerably less than the amount he had it insured for. In fact, the World Trade Centre towers were “filled with asbestos” and deemed “nearly worthless” at the time. [16]

Very soon after the attacks Silverstein, now 83, declared his intent to re-build but not before he filed for damages of over $7 billion from his insurers. He claimed the attacks on the World Trade Centre constituted two separate events and thus entitling him to double the pay-out. [17] (After years of financial wrangling with the insurance company, Swiss Re, he was paid $4.6 Billion)

Larry-Silverstein

Larry Silverstein

Not being one to ignore safety and security (especially when his own skin is involved) Mr. Silverstein changed the security company for Securacom (now Stratosec). The board of directors included George W. Bush’s brother, Marvin Bush and the CEO was none other than Marvin’s cousin, Wirt Walker III. (Securacom’s job was to provide electronic security for the WTC and also Dulles International Airport and United Airlines, both of which had a key part to play in the 911 attacks). [18]

Members of the Silverstein family and associated high level business colleagues survived the WTC tragedy. Instead of the usual, scheduled breakfast meeting to take place at the WTC, Larry had a doctor’s appointment on September 11th.

One year after the September 11th attacks Silverstein gave an interview for the 2002, PBS documentary America Rebuilds. He then makes a serious gaff by telling the PBS reporters: “I remember getting a call from the, er, fire department commander, telling me that they were not sure they were gonna be able to contain the fire, and I said, ‘We’ve had such terrible loss of life, maybe the smartest thing to do is pull it. And they made that decision to pull and we watched the building collapse.”

It seems to me – and one would imagine anyone hearing words like “pull” and “collapse” in the same sentence – that this would be referring to demolition of a building. Journalist Joël van der Reijden, writing in a 2005 article on 9/11 contacted implosionworld who told him the following:

“There is no such phrase in explo-demo. Most likely he meant “pull out” as in have people evacuate. Conventionally, “pull a building” can mean to pre-burn holes in steel beams near the top floor and affix long cables to heavy machinery, which then backs up and causes the structure to lean off its center of gravity and eventually collapse. But this is only possible with buildings about 6-7 stories or smaller. This activity was performed to bring down WTC 6 (Customs) after 9/11 because of the danger in demolishing conventionally.” [19]

It is also worth remembering that he said “pull it” Not “pull them”. The word “it” was referring to the building as anyone can logically deduce. Later attempts by Silverstein to claim that he was talking about pulling the fire-fighters from WTC 7 is implausible in the extreme considering there was no one left inside at the time of the statement. This is verified by the fact that Silverstein has admitted that he made his “pull it” statements “at about 3:30 or 4:00pm,” [20] with the official NIST report indicating that Building 7 had already been fully evacuate between 12:30pm and 2:00pm. [21] So, when Silverstein and the fire commander were apparently having this conversation to “pull it” everyone was long gone.

However, there is something odd about the whole thing. Would Silverstein really have let slip such a thing if he did indeed have insider knowledge? We hardly need such an obvious statement to deduce that building 7 was demolished. Reijden believes it is a red herring, which may be the case. As to Silverstein’s “need-to-know” role in the events of 9/11 is obviously vague. Financially however, he was set to gain by this tragedy and gain substantially.

A 2010 Fox News report by Jeffrey Scott Shapiro reported on an alleged discussion Silverstein had had with his insurance carrier about demolishing Building 7:

“Shortly before the building [Building 7] collapsed, several NYPD officers and Con-Edison workers told me that Larry Silverstein … was on the phone with his insurance carrier to see if they would authorize the controlled demolition of the building – since its foundation was already unstable and expected to fall. A controlled demolition would have minimized the damage caused by the building’s imminent collapse and potentially save lives. Many law enforcement personnel, firefighters and other journalists were aware of this possible option.” [22]

Shapiro ended up shooting himself in the foot with this admission because the report was designed to be a hit piece against Governor Jesse Ventura who is highly sceptical of the official story. Finally, if true, Shapiro’s statements not only suggest foreknowledge and criminal culpability on the part of Silverstein, but confirm the reality of a controlled demolition.

Fourteen years later After Mr. Silverstein used the insurance proceeds from the Sept. 11, 2001 terrorist attacks to help fund the construction of 4 World Trade Center and 7 World Trade Center, Silverstein Properties is still busily raking over the mythos of Ground Zero and making considerable profits to boot. His latest building project is World Trade Center Tower 3 a planned 80-story, 2.5 million-square-foot, $2.3 billion office tower in the financial district of WTC. [23]

Unfortunately, for Larry, the construction loans amount to $1.1 billion, a sum that the Port Authority refused to guarantee, much to his apparent “surprise”, citing doubts about profitability amid a depressed market. According to  Crain’s New York Business:

“Mr. Silverstein has burned through more than $460 million that was available for 3 World Trade Center building the property’s below-grade infrastructure and first eight stories, where it is currently capped. That space will be used for retail and the mechanical systems for the neighboring PATH hub—areas of the building that Silverstein Properties does not control.” [24]

Since he and his private sector cartels are used to profiting from tragedy if need be, this must indeed be a blow. As Chris Ward, the former executive director of the Port Authority mentioned, no doubt with a wry smile: “Larry was used to getting everything he wanted at the site,” … “To lose the support he was hoping to get, I think must be a shock and a blow.” 

Poor Larry.

This set back didn’t stop him in his decade-old bid to recover billions of dollars from two airlines whose planes were used in the 9/11 attacks in order to rebuild the World Trade Centre. Having already collected the tidy sum of $4.1 Billion from insurers over the WTC destruction U.S. District Judge Alvin K. Hellerstein thankfully rejected his bid on July 19th 2013.

Perhaps he should hold out for another “terrorist” attack on his latest rebuild?

wtc7-old-new1

The Old WTC 7 (left) and the New WTC 7 started in 2002 and completed in 2006 | Source: Wikipedia and www.911review.com/

There are other reasons why WTC 7 may have needed to be “pulled “on 911. The sky-scraper wasn’t just another office building but housed financial institutions and government agencies including the offices of the IRS, Secret Service, SEC and the CIA (though the latter was not listed). The Securities and Exchange Commission (SEC) and the Equal Employment Opportunity Commission (EEOC) had their work cut out after the financial terrorism of 2008. But SEC had been working hard on many case files for 3000 – 4000 of its cases, a “substantial” number of which were stored in building 7 and reportedly destroyed during the implosion. The EEOC reported that documents for 45 active cases were also destroyed. [25] SEC was still covering investigations of corporate fraud by companies such as Enron and Worldcom before the 911 attacks though nothing more has been heard of these and similar investigations. (See Table below).

This is not the only whiff of opportunism in the air. According to a New York Times report from November 2001, the CIA’s clandestine New York station “… believed to have been the largest and most important C.I.A. domestic station outside the Washington area,” was also destroyed. The Times continued: “The agency’s New York station was behind the false front of another federal organization, which intelligence officials requested that The Times not identify. The station was, among other things, a base of operations to spy on and recruit foreign diplomats stationed at the United Nations, while debriefing selected American business executives and others willing to talk to the C.I.A. after returning from overseas.” The agency’s officers in New York often work undercover, posing as diplomats and business executives, among other things, depending on the nature of their intelligence operations. [26]

The reporter gives us the background about the stalwart defenders of US freedom had sharpened up their act since the Iranian embassy hostage crisis of 1980. Since then, no classified documents would see the light of day even under such dire circumstances as the 911 attacks. One could also speculate that there would have been even less of a paper trail if this CIA front wasn’t solely an intelligence hub at all but served as the central command centre for the demolition(s) themselves. The report goes on to say that: “… the C.I.A. seems poised to begin focusing its resources on terrorism in much the same way it once focused on the Soviet Union in the cold war.” [27]

Which is exactly what may have been required: a new reason for those tax dollars and the introduction of a whole new episode in Cold War propaganda to fuel that insatiable military-corporate-intelligence machine. After all, this is standard Zio-Conservative ideology: perpetual war serviced by the a global financial shock doctrine. 

Tenant

Square Feet

Floor

Industry

Salomon Smith Barney

1,202,900

GRND, 1-6,13,18- 46

Financial Institution

IRS Regional Council

90,430

24, 25

Government

U.S. Secret Service

85,343

9,10

Government

C.I.A.

N/A

N/A

Government

American Express Bank International

106,117

7,8,13

Financial Institution

Standard Chartered Bank

111,398

10,13,26,27

Financial Institution

Provident Financial Management

9,000

7,13

Financial Institution

ITT Hartford Insurance Group

122,590

19-21

Insurance

First State Management Group, Inc.

4,000

21

Insurance

Federal Home Loan Bank

47,490

22

Financial Institution

NAIC Securities

22,500

19

Insurance

Securities & Exchange Commission

106,117

11,12,13

Government

Mayor’s Office of Emergency Management

45,815

23

Government

Organisations, agencies and companies in Building 7 on September 11th 2001. (And the CIA).  [Courtesy of Jim Hoffman http://www.WTC7.net.]

If the above love-in between intelligence and financial sharks all under one roof doesn’t cause concern then I’m not sure what does. Right at the bottom we find our super-hero Mayor once again.

Rudy Giuliani received an honorary knighthood by the Queen and managed to have his mug plastered across Time magazine as person of the year 2001, despite the Fire and Police department offering a very different view of Rudy’s contribution. [28] As we know, Mayor Giuliani vacated WTC 7 just a few hours before it was “pulled.”

His Office of Emergency Management, and its emergency command centre was on the 23rd floor, and against considerable public protest had already received 13 million dollars’ worth of renovations, “… reinforced, bulletproof, and bomb-resistant walls, its own air supply and water tank, beds, showers to accommodate 30 people, and three backup generators.” It also had: “… rooms full of video monitors from where the mayor can oversee police and fire department responses and where it was: “… staffed around the clock and … intended as a meeting place for city leaders in the event of an act of terrorism.” [29]

The centre was ridiculed as “Rudy’s bunker,” and according to author Philip Shenon it: “… seemed the supreme example of how Giuliani’s ego and arrogance knew no bounds after four years in office.” [30] In Giuliani’s modestly named biography Leadership (2002) he states: “As shocking as [the first] crash was, we had actually planned for just such a catastrophe.” [31] All of that being so, as 9/11 journalist Jim Hoffman at WTC7.net mentions: “How curious that on the day of the attack, Giuliani and his entourage set up shop in a different headquarters, abandoning the special bunker designed precisely for such an event.” [32]

It is commonly known that various officials on the day relayed warnings that something was afoot with Building 7 – namely, that it was in danger of coming down. The rumour that the building was falling was in the air. The ubiquity of foreknowledge seemed to extend to the TV networks in what can only be described as a major glitch in communications. Yet, two TV networks announced the collapse of WTC 7 before it had actually happened.

Discovered in a vast archive of broadcast footage publicized in late February of 2007, a video clip of CNN anchor Aaron Brown was seen announcing live, that: “We are getting information now that one of other buildings, building 7, in the world trade centre complex is on fire and has either collapsed or is collapsing.” Allowing for confusion, who was it that told him that a collapse was even a possibility? [33]

bbc-wtc-building-7

BBC journalist Jane Standley on end of a confusing cock-up in timing. Someone let the script out of the bag at the wrong time. | Source: The Goddard Report archives

Similarly, archived footage of television broadcasts from 9/11/2001 shows the BBC’s Jane Standley reporting the collapse of WTC 7 about 23 minutes before it actually occurred. She is unaware that the building is still standing behind her. At 4:57pm the BBC News anchor Philip Haton announced: “…We’ve got some news just coming in actually, that the Salomon Brothers’ [WTC 7] Building in New York, right in the heart of Manhattan, has also collapsed.” At 5:07 pm he continues:

“Now more on the latest building collapse in New York … you may have heard a few moments ago we were talking about the Salomon Brothers Building collapsing and indeed it has, and apparently it’s only a few hundred yards away from where the World Trade Center Towers were. And it seems that this was not the result of a new attack; it was because the building had been weakened during this morning’s attacks. We’ll probably find out more about that from our correspondent Jane Standley. Jane, what more can you tell us about the Salomon Brothers’ Building and its collapse?” [34]

Standley explained in a later interview: “It’s very unfortunate that this whole conspiracy – kind of – ridiculous situation has grown out of what’s really a very small and very honest mistake.”  [35] Actually, it was a rather enormous mistake, the import of which seems to have been lost on her. Reporting that the Solomon building had collapsed, while it actually remained standing in the live shot behind her head until the BBC promptly cut the feed seems more than a little odd. Just 23 minutes later when WTC 7 did collapse suggests scripted foreknowledge on the part of someone, though not necessarily the reporters in question.

The BBC’s Richard Porter defended the organisation from accusations of foreknowledge stating:

“We no longer have the original tapes of our 9/11 coverage (for reasons of cock-up, not conspiracy). So if someone has got a recording of our output, I’d love to get hold of it. We do have the tapes for our sister channel News 24, but they don’t help clear up the issue one way or another. If we reported the building had collapsed before it had done so, it would have been an error – no more than that. As one of the comments on You Tube says today ‘so the guy in the studio didn’t quite know what was going on? Woah, that totally proves conspiracy…’” [36]

Porter’s protestations are correct in that foreknowledge does not necessarily imply complicity on the part of the BBC reporter and staff. What he fails to acknowledge is why such a precise “cock-up” regarding the collapse of WTC 7 was even on the table. Who was it that communicated the information to create such a scenario? Who planted the seed?

 


Notes

[1] Gilsanz, Ramon, Edward M. DePaola, Christopher Marrion, and Harold ‘Bud’ Nelson (May 2002). ‘WTC7 (Chapter 5)’ (PDF). World Trade Center Building Performance Study. FEMA.
[2] BBC Conspiracy Files: “9/11 – The Third Tower.” June 7 2008. | ‘The Survivors inside the Towers “they scrambled”’ By paul Vallely, The Independent, September 13, 2001.
[3] http://www.youtube.com/watch?v=Uso9sCOakEQ. Starts at 2:05 into the video; ends at the 3:40.
[4] http://www.youtube.com/watch?v=STbD9XMCOho
[5] This is excluding the Penthouse residing on the top floor of WTC 7 which began to collapse before the primary structure and should be taken as a separate entity in itself as Mechanical engineer Tony Szamboti describes: “The WTC 7 East penthouse had columns on its perimeter and none in its interior. On three sides these columns mounted near the edge of the roof of WTC 7. It is unlikely that a collapse of any core columns of the main building could have pulled them completely down without the roof beams breaking completely loose from the exterior columns and moving down completely also. It is unlikely that the roof beams were severed from the exterior columns, which is what would be necessary for a core collapse to cause the penthouse to collapse.”
[6] NIST WTC 7 Technical Briefing, August 26, 2008. http://www.911speakout.org/NIST_Tech_Briefing_Transcript.pdf Transcript p.16
[7] ‘Undisputed Facts Point to the Controlled Demolition of WTC 7’ By Richard Gage, Architects and Engineers for 9/11 Truth March 28, 2008.
[8] Ibid.
[9] Ibid.
[10] Ibid.
[11] op. cit Roberts
[12] http://www.youtube.com/watch?v=k3DRhwRN06I
[13] Ibid.
[14] Danny Jowenko: – Proprietor, Jowenko Explosieve Demolitie B.V., a European demolition and construction company, with offices in the Netherlands. Founded 1980, Jowenko Explosive Demolition is certified and holds permits to comply with the Dutch Explosives for Civil Use Act and the German Explosives Act. Jowenko’s explosives engineers also hold the German Certificate of Qualifications and the European Certificate for Shotfiring issued by The European Federation of Explosive Engineers. | Telephone interview with Jeff Hill 2/22/07 http://www.patriotsquestion911.com /engineers.html | For mp3 recording of telephone conversation go to: http://www.pumpitout.com/audio/danny_jowenko_022207.mp3.
[15] ‘Experts Urging Broader Inquiry in Towers’ Fall,’ New York Times, December 25, 2001.
[16] ‘Asbestos in the WTC’ Towers’ Destruction ‘Solved’ Asbestos Problem’ www 911research.wtc7.net/ | “The Twin Towers had large amounts of asbestos fireproofing which would have necessitated costly removal had they remained standing. The exact amount and distribution of the asbestos in the Towers remains unclear, like other details of the buildings’ construction and history, but the evidence suggests that the cost of its removal may have rivaled the value of the buildings themselves.”
[17] ‘Magnate’s Tower Plan Under Threat’, By Simon English, Daily Telegraph, October 10, 2001.
[18] ‘Larry “Lucky Larry” Silverstein’ September 7 2006. http://www.informationliberation.com
[19] ‘9/11 – My own review of the entire event’ By Joel van der Reijden, March 19, 2005. | http://web.archive.org/web/20050327052408/http://home.planet.nl/~reijd050/911_my_own_review.htm#222
[20] See “WeAreCHANGE confronts Larry Silverstein 3/13/08,” http://911blogger.com/node/14361,(1:45)
[21] NIST NCSTAR 1-9, Structural Fire Response and Probable Collapse Sequence of World Trade Center Building 7, Draft for Public Comment, August 2008, pages 301-302. See http://www.wtc.nist.gov/media/nist_ncstar_1-9_vol1_for_public_comment.pdf
[22] ‘Shame On Jesse Ventura!’By Jeffrey Scott Shapiro, FoxNews.com, April 22, 2010.
[23] ‘Silverstein: Build it and they will come’ By By Konrad Putzier, Real Estate Weekly, April 2, 2014.
[24] ‘The toughest test of Silverstein’s nine lives’ By Daniel Gieger, Crain’s New York Business, June 1, 2014.
[25] ‘SEC & EEOC: Attack Delays Investigations’, National Law Journal, September 17, 2001.
[26] ‘Secretive CIA Site in New York Was Destroyed on Sept. 11’ by James Risen, New York Times, November 4, 2001.
[27] Ibid.
[28] Rudy seemed to revel in the attention. In August 2007, Giuliani claimed that “I was at Ground Zero as often, if not more, than most workers…. I was there working with them. I was exposed to exactly the same things they were exposed to. So in that sense, I’m one of them.” This understandably caused anger amongst New York’s Fire and Police personnel 911 workers. In actual fact, Rudy was had also been telling porkies it seems. “He had spend a total of 29 hours over three months at the site; with his appointment logs unavailable for the six days immediately following the attacks. This contrasted with recovery workers at the site who spent this much time at the site in two to three days. The recovery workers often spent hundreds of hours working 8 to 12 hour shifts.” (Wikipedia: http://www.en.wikipedia.org/wiki/Rudy_Giuliani_during_the_September_11_attacks#During_the_attack
[29] ‘New York City’s Anti-Terrorism Efforts go Hi-Tec’ CNN.com, June 7, 1999.
[30] ‘Mayor of the World’ by Eric Pooley, Time, December 22, 2001.| The Commission: The Uncensored History of the 9/11 Investigation by Philip Shenon. Published by Twelve, 2008. | ISBN-10: 0446580759 (pp.346 – 347)
[31] p.3-6; Leadership by Rudolph W. Giuliani Published by Miramax Books, 2002.
[32] Jim Hoffman, http://www.wtc7.net/background.html
[33] http://www.youtube.com/watch?v=N1LetB0z8_o
[34] www.http://ia311517.us.archive.org/2/items/bbc200109111654-1736/V08591-16.mpg
[35]’9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence’ James Higham
Global Research, August 18, 2011-nourishingobscurity.com 18 August 2011.
[36] ‘Inside the BBC: Mission and values’ Richard Porter, February 2007 http://www.bbc.co.uk/aboutthebbc/insidethebbc/whoweare/mission_and_values/

Unanswered Questions

 By M.K. Styllinski

“In politics, nothing happens by accident. If it happens, you can bet it was planned that way.”

Franklin D. Roosevelt


9/11 was an attack against the minds of the American people.

Shock, fear and anger were the intended by-products of a Hollywood-style production which was delivered to mobilise the mass consciousness towards accepting long-term social and geo-political objectives. Once this programming was in place it was relatively easy to begin pointing fingers at an historical bogey-man which has been carefully cultivated as the Muslim terrorist. What rapidly followed was the invasion of Afghanistan, Iraq and the later invasions of Libya and covertly Syria. Along with Russia, the destabilisation and ransacking of Iran remains an important goal for the Three Establishment Model. As a consequence, literally hundreds of thousands of civilians – most of whom were children – were killed, maimed and psychologically traumatised, with others suffering from intractable health problems.

The core planners of the September 11th attacks were a combination of audacity, ambition, years of careful planning and the reliance on the inculcation of an Official Culture to carry out their plans. The hackneyed displays of “evidence” were designed to appeal to those eager to believe the official story. Shoddiness of this kind is an indication of how blasé and arrogant the architects of this coup really were. Leaving pristine passports lying around in the rubble to be found and copies of the Koran liberally sprinkled everywhere just to reinforce the idea that all roads led to Al-Qaeda, as but two such examples. “Mistakes” like these do not conform to the ambition and precision of the false flag operation. However, if you wanted to falsely blame it on Muslim terrorists as the history of Al-Qaeda operations shows, then such “blunders” begin to make sense.

So, who would benefit from blaming the Islamic world, its fundamentalism having been fuelled by the very same forces?

The Three Model Establishment of Liberalism, Conservative and Zionist factions. It was their crowing achievement, or – depending on which side of the fence one is – the beginning of their eventual demise.

What should have been the most rigorous and extensive international forensic operation ever conducted was turned into the biggest media circus and cover up in modern times. Ground Zero became a travesty of justice with no attempts to maintain the integrity of what was a vast crime scene. Thanks to Mayor Rudy Giuliani and friends, all the evidence was shipped away before forensics could sift through it. [1]  It is only after almost fourteen years that enormous amounts of data has been pieced together by scientists, academics and the general public who may not all agree with the various conclusions, but a broad consensus exists: that the official story is not only suspect but patently false from whichever angle you approach. Various 9/11 commissions merely extended and built on what is already monumental lie, quickly accepted by the MSM and the majority of the public and which remains entrenched in contemporary beliefs. Recently, certain members of those commissions have begin to speak out, reporting on the restrictive nature and manipulation of data. Indeed, it has even been reported that most 9/11 commissioners do not believe the official story either. [2]

Image programming is immensely powerful. Replaying the destruction of the Twin Towers over and over and thus stimulating the instinct of fear and the emotions of anger and pain is not conducive to object study and reflection. As Historian Laura Knight-Jadczyk observes:

“Brain studies show that what is suggested during a period of pain or shock becomes MEMORY. The brain sort of ‘traps’ the ideas being assimilated at times of pain and shock into permanent ‘synaptic patterns of thought/memory.’ The conditions surrounding the events of 9-11 were perfect for creating specific impressions and memories – manipulation of the minds of the masses by shocking events and media spin.” [3]

And so it is.

dhphoto

Let’s see why this programming has been so successful by taking a cursory look at some of the most glaring issues surrounding 9/11.

Since at least 1996, Federal authorities were aware that suspected terrorists had ties to Osama bin Laden and had been receiving flight training at schools in the US and abroad. There was even an account by one terrorist that his mission was to fly a plane into CIA headquarters.[4] In fact, there were multiple reports of bin Laden’s location given to both the CIA and the FBI between 1996 and right up to the day before September 11th, 2001. Agents’ reports were ignored or they were actively prevented from taking out bin Laden by top brass. The New York Times reported that:

 [5]“… at least three occasions between 1998 and 2000, the C.I.A. told the White House it had learned where Mr. bin Laden was and where he might soon be. Each time, Mr. Clinton approved the strike. Each time, George Tenet, the director of central intelligence, called the president to say that the information was not reliable enough to be used in an attack, a former senior Clinton administration official said.”

Among the numerous failures in basic protocol and administrative procedures that allowed the hijackers a literal free pass to do as they pleased, one report shows 15 of the 19 hijackers did not fill in visa documents properly in Saudi Arabia. (Yes, that’s right 15 of them) and only six were interviewed. Why were 15 of these hijackers not denied entry into the US? [6] It was reported just a few days after the attacks that several of the 9/11 hijackers, including leader Mohamed Atta, may have had training at secure US military installations and when many of the hijackers’ mug-shots were lifted from the University campus yearbooks. The 911 Commission Report was destined to be a laughing stock. [7] According to a 2001 report in The Times of London: “Five of the alleged hijackers have emerged, alive, innocent and astonished to see their names and photographs appearing on satellite television … The hijackers were using stolen identities.” [8]

By 2000 and 2001, the military were conducting simulation exercises where hijacked airliners were crashing into targets causing mass casualties. Those targets included the World Trade Centre (WTC) and the Pentagon. If we are to believe White House and security officials, they were as shocked as little Bo Beep at such wildly improbable scenarios. [9] The politicians followed the same script with President George W. Bush stating with wide-eyed innocence: “nobody in our government at least, and I don’t think the prior government, could envisage flying air planes into buildings.” National Security Advisor Condoleezza Rice also exclaimed: “… no one could have predicted that they would try to use an airplane as a missile.” Which is curious, considering CIA director George Tenet’s intelligence summary was prepared for Condoleezza Rice on June 28 and read: “It is highly likely that a significant Al-Qaeda attack is in the near future, within several weeks.” [10] And just to make sure the same memo was received by all; FBI Director Robert Mueller added his chorus line soon after the attacks with: “there were no warning signs that I’m aware of that would indicate this type of operation in the country.”

Actually, it was common knowledge that ideas had been seeded in terrorists’ minds to use planes as weapons since 1995. So, our Bob was either lying or so ignorant that he was only the head of the FBI due to his ability to stack paperclips. Even an Air Force general stretched credulity still further with his variation on a theme by stating: “… something we had never seen before, something we had never even thought of.”  [11]

Please…

According to 9/11 expert and author Dr. David Ray Griffin it gets much worse:

“… in 1993 a panel of experts commissioned by the Pentagon suggested that airplanes could be used as missiles to bomb national landmarks. However this notion was not published in its report, Terror 2000, because, said one of its authors: ‘ We were told by the Department of Defense not to put it in.’ […] In that same year, there were three planes hijacked with the intent to use them as weapons, including a highly publicized plan of a terrorist group linked to Al-Qaeda to crash one into the Eiffel Tower. In 1995, Senator Sam Nunn, in Time magazine’s cover story, described a scenario in which terrorists crash a radio-controlled airplane into the US Capitol building.”  [12]

There was also the little matter of another training exercise, this time by a US intelligence agency set for Sept 11th at 9am in which a jet airliner would crash into one of its buildings near Washington, DC. The chances of military drill exercises taking place at the same time as a real-time attack is so statistically improbable as to be impossible. As it happens, one chance in 3,715,592,613,265,750,000,000,000,000,000,000,000, 000 – to be precise. [13] Strangely enough, this is precisely what occurred in the 7/7 London bombings in 2005. A private consultancy agency called Visor Consultants, linked to the government and police was also running a 1,000 person exercise for an unnamed company adopting the exact same scenario with the Underground being bombed at the exact same times and locations as the attacks on the morning of July 7th.  [14]

Just another improbable “coincidence” or a tactic for creating confusion within agencies as well as the general public? Actually, training exercises are incredibly common in many false flag attacks in general (See: False Flags? 63 Terrorism Incidents & Training Exercises)

In 2012, the National Security Archive released 120 previously secret documents concerning the September 11th, 2001 attacks on the United States. They showed yet again that President George W. Bush was lying through his teeth. The documents showed:

“From June to September 2001, a full seven CIA Senior Intelligence Briefs detailed that attacks were imminent, an incredible amount of information from one intelligence agency. One from June called ‘Bin-Ladin and Associates Making Near-Term Threats’ writes that ‘[redacted] expects Usama Bin Laden to launch multiple attacks over the coming days.’ The famous August brief called ‘Bin Ladin Determined to Strike the US’ is included. ‘Al-Qai’da members, including some US citizens, have resided in or travelled to the US for years, and the group apparently maintains a support structure here,’ it says.”  [15]

It’s not just America’s intelligence personnel who are silenced. Britain, Germany, France, Sudan, Egypt, Israel and Russian intelligence agencies warned of impending attacks on the US, all of whom were ignored. [16] Russian President Vladimir Putin later stated that in August of 2001, he ordered his intelligence: “… to warn President Bush in the strongest terms that 25 terrorists were getting ready to attack the US, including important government buildings like the Pentagon.” The head of Russian intelligence also said: “We had clearly warned them on several occasions, but they did not pay the necessary attention.” [17]

Britain’s contribution to the warnings was in the form of an official memo included in an intelligence briefing for President Bush on August 6th which said that: “… Al-Qaeda had planned an attack in the United States involving multiple airplane hijackings.” However: “The White House kept this warning secret, with the President repeatedly claiming after 9/11 that he had received no warning of any kind. On May 15, 2002, CBS Evening News revealed the existence of the memo from British intelligence … [The US administration] refused to release the memo while claiming there was nothing specific in it.”[18]

Compartmentalisation of intelligence managed by strategically placed high-level personnel allowed the plans for 9/11 to proceed with relatively little resistance. Official Culture of programmed belief systems did the rest.


 “I am increasingly troubled at the inconsistencies in the official narrative of 9/11. It’s not just the obvious non sequiturs: where are the aircraft parts (engines, etc.) from the attack on the Pentagon? Why have the officials involved in the United 93 flight (which crashed in Pennsylvania) been muzzled? Why did flight 93’s debris spread over miles when it was supposed to have crashed in one piece in a field?”

journalist, Robert Fisk


As 2001 entered the picture a long-time tradition of leaving the oil-rich Saudis alone took on epic proportions of favouritism. The CIA and FBI ordered its employees to avoid the bin Laden’s and Saudi royals – they were untouchable. When the House and Senate Intelligence Committees’ final report of the Joint Inquiry into 9/11 eventually arrived in 2003, some 28 pages had been redacted. These reportedly dealt primarily with Saudi Arabia and three Saudi princes who were suspected of being involved in the financing of 9/11 hijackers. They were to die in 2002, within days of each other and in mysterious circumstances. [19]

In 2000, The French intelligence agency, the DGSE, as part of a claim that they regularly pass on intelligence to the CIA, published a 13-page classified report entitled “The Networks of Osama bin Laden.” In the report, a wealth of detailed information about Al-Qaeda is described including the payment of $4.5 million from the International Islamic Relief Organization (IIRO) to bin Laden. However, the IIRO is off limits to US investigations due to its close ties with the Saudi government. [20] The report also casts doubt on Osama bin Laden as the “black sheep” of the family and cultivating the idea of “good and bad” bin Ladens. French journalist Guillaume Disquié writing for La Monde observed: “It seems more and more likely that bin Laden had maintained contacts with certain members of his family, although the family which directs one of the largest groups of public works in the world, has officially renounced him. One of his brothers apparently plays a role as intermediary in its professional contacts or the monitoring of its business.” [21]

It was the same story with the Taliban in Afghanistan. In 1998, Julie Sirrs was a military analyst for the Defence Intelligence Agency (DIA) and travelled to the country on various missions from 1997 – 2001. On the part of her superiors and CIA top brass she encountered disinterest and apathy regarding Osama bin Laden’s whereabouts and actions.

bin_laden1

Osama Bin Laden’s family had longstanding oil connections to the Bush Dynasty.

In early 2001, she travelled undercover to meet Northern Alliance leader Ahmed Shah Massoud and observed a terrorist training centre in Taliban-controlled territory. Sirrs later claimed: “The Taliban’s brutal regime was being kept in power significantly by bin Laden’s money, plus the narcotics trade, while [Massoud’s] resistance was surviving on a shoestring. With even a little aid to the Afghan resistance, we could have pushed the Taliban out of power. But there was great reluctance by the State Department and the CIA to undertake that.” [23]  According to Sirrs and many other commentators, this was primarily due to the US State Department’s interest in securing the trans-Afghanistan pipeline under contract in the region to the American Unocal Corporation. Political stability of the Taliban regime was essential to that end.[23]

Despite returning with a “treasure trove” of photos, maps and interview recordings, her security clearance was pulled and materials confiscated. She was later accused of being a spy, prompting her resignation from the DIA in 1999.  Sirr’s discovery of collusion in CIA and Afghanistan drug lines as well as the protection of Osama as a long-time CIA asset was the probable cause. [24]

It appears that protecting the bin Ladens was a top level directive which meant many FBI agents were blocked in their efforts to investigate and who often resigned disillusioned and frustrated. Reports of FBI units in Phoenix, Minneapolis, Chicago and New York being obstructed in their duty surfaced in 2001, with reassignments, stone-walling and the alteration and/or deletion of data connected to the bin Ladens and Saudi nationals was carried out.  [25]

bushladen-networkSource: http://www.questionsquestions.net/ (now defunct)

Let’s not forget that the bin Ladens, as one of the richest families in Saudi Arabia had business dealings with the Bush family for over twenty years. Following the week after the attacks it was learned that bin Laden’s family had been taken under the wing of a branch of FBI supervision and escorted out of the country by private plane, before the national air ban was lifted.

Perhaps the Bush and bin Laden family ties to oil exploration might have had something to do with it? [26] 

The disclosure of 52 intelligence warnings to the Federal Aviation Administration (FAA) of the threat of terrorist hijackings between April and September, 2001, makes this somewhat easier to understand. [27] Resources, from oil, gas, food and water have always been one of the primary objectives of Anglo-American expansionism and World Order philosophy.

In the Spring of 2001, military and governmental policy documents revealed the implementation of PSYOPS to legitimize the use of US military force in the pursuit of oil and gas. This was an extension of the Neo-Conservative, National Security strategy of preemption. A Council on Foreign Relations darling Mr. Jeffrey Record advocated: “… the acceptability of presidential subterfuge in the promotion of a conflict” and further: “… urged painting over the US’s actual reasons for warfare with a nobly high-minded veneer, seeing such as a necessity for mobilising public support for a conflict.” [28]

Donald Rumsfeld and other Bush officials stated that the whereabouts of bin Laden were unknown. Yet, a very ill Osama bin Laden had received kidney treatment from Canadian-trained Dr. Terry Calloway in July 2001, at the American Hospital in Dubai, in the United Arab Emirates. He had also been treated to a visit by CIA agents and the head of Saudi Intelligence. [29] [30] Meanwhile, A CBS News report headed by soon to be sacked Dan Rather claimed bin Laden was back in hospital on September 10, one day before the 9/11 attacks and in the process of being safely tucked up in bed by the CIA’s Intel ally the Pakistani Military Intelligence (ISI). The CBS report revealed that bin Laden had received further dialysis treatment in Rawalpindi, at Pak Army’s headquarters, under the jurisdiction of Pakistani Armed forces with close ties to the Pentagon. [31]

Why was no attempt made to arrest the nations “most wanted terrorist”? Why lie about Osama’s whereabouts? Unless that is, he was serving a greater purpose.

Though the reports were denied by the CIA, the hospital and bin Laden himself, Dr. Calloway reportedly refused to comment, and the media outlets who ran the stories stood by them. After all, the US authorities could easily have ordered his arrest and extradition in Dubai July 2001, but they did not. Volumes of other evidence suggest that, in the words of Alex Standish of Jane’s Intelligence Review: “The attacks of 9/11 were not an intelligence failure but the result of a political decision not to act against bin Laden.”

Without a pretext, there would have been no war on terror and no Grand Plan for the monopolisation of the Middle East.

On the morning of September 11th a cosy breakfast rendezvous had been arranged on Capitol Hill with head of Pakistan’s military intelligence General Mahmoud Ahmad, members of the Senate and House Intelligence committees and several other attendees, including senator Bob Graham, subsequent CIA head Porter Goss; senator John Kyl and Pakistan’s ambassador to the US, Maleeha Lodhi. [32]  Despite the CIA and Pakistani ISI working in hand in hand for decades, ISI Chief Mahmoud Ahmad’s cheery presence over orange-juice and pancakes takes on a brevity when we realise that the General not only: “… ran a spy agency notoriously close to Osama bin Laden and the Taliban,” but was alleged to have organised the wiring of $100,000 to WTC hijacker Mohamed Atta from Pakistan via Intel asset Ahmad Umar Sheikh. [33]

What were Rep. Porter Goss and Senator Bob Graham and other members of the Senate and House intelligence committees doing together with the alleged 9/11 “money-man” at breakfast on the morning of 9/11? More importantly, what were the same individuals (Goss and Graham) who had developed a personal rapport with General Ahmad, doing on the joint committee inquiry into 911? Conflict of interest would be an understatement.

On September 12th General Mahmoud Ahmad had negotiations at the office Deputy Secretary of State Richard Armitage and again with Secretary of State Colin Powell on the 13th as though the attacks were a mere fomality.  Just what was this General doing meeting with such a wide ranging set of top of officials and despite the greatest “terrorist” attack on American soil?

usualsuspects2

One month later in August 2001, “Bin Laden Determined to Strike in US,” was the title of the intelligence briefing Bush received which also mentioned the World Trade Centre as a possible target. In 2004, Bush was busy lying so atrociously it placed the media in the spotlight for their purposeful ineptitude rather than the fact that George W. clearly knew he was going to get away with it. He claimed it: “… said nothing about an attack on America,” even though the subject of the briefing was about just such an attack. [34]

As the big day approached it seems there were plenty of people who knew that something dramatic was about to happen; so many in fact, it fell way beyond the bounds of mathematical probability. Just a day before the attacks several top Pentagon officials abruptly cancelled their travel plans for the following morning due to “security concerns.” Several other officials were also told not to fly by persons unknown.

At 1.00am in the morning of September 11th San Francisco Mayor Willie Brown, scheduled to fly to New York that morning, received a warning from his “security people at the airport” advising him to be cautious in his travelling. Although later reports would claim that this was due to picking up on a State Department warning of September 7 which focused on the threat to military personnel in Asia, why it was personally issued to Brown, remains unknown. Attorney General John Ashcroft had also been warned by the FBI in August 2001 to avoid commercial airlines, but this information never made it to the media until much later. Indeed, it seemed Ashcroft was hiding something.[35]

David Ray Griffin observed:

In late July… the Taliban’s Foreign Minister informed US officials that Osama bin Laden was planning a ‘ huge attack ‘ inside America that was imminent and would kill thousands. That the information indicated that the attack was to involve commercial airlines is suggested by the fact that on July 26, CBS News reported that Attorney General Ashcroft had decided to quit using this mode of travel because of a threat assessment – although neither the FBI nor the Justice Departmentwould identify what the threat was, when it was detected, or who made it.’

In May of 2002, it was claimed that the threat assessment had nothing to do with Al-Qaeda, but Ashcroft, according to the Associated Press, walked out of his office rather than answer questions about it. The San Francisco Chronicle complained: ‘The FBI obviously knew something was in the wind…. The FBI did advise Ashcroft to stay off commercial aircraft. The rest of us just had to take our chances.’ CBS’s Dan Rather later asked, with regard to this warning: ‘ Why wasn’t it shared with the public at large?’  [36] [Emphasis mine]

Presumably, for the same reason so much other information wasn’t shared with the public.

As if this wasn’t strange enough, on September 11th aftermath, data extracted from 32 damaged computer hard drives revealed evidence of an unusual rise in financial transactions peaking just before the attacks. Over $100 million of illegal transfers were made through WTC computer networks immediately before and during the 911 attacks. [37]

Insider trading suggesting foreknowledge of the attack was also evidenced from huge surges in purchases of put options on stocks of the two airlines used in the attack United Airlines and American Airlines; on stocks of Munich Re and the AXA Group reinsurance companies expected to pay out billions to cover losses from the attack; stocks of financial services companies Merrill Lynch & Co., and Morgan Stanley Dean Witter, (which occupied 22 stories of the WTC) and Bank of America incurring losses from the attack; on stocks of a weapons manufacturer Raytheon expected to reap massive rewards from the disaster and major surges in purchases of 5-Year US Treasury Notes. Indeed, the overall level of put option trading was up by “1,200 percent” in the three days prior to the World Trade Centre attacks. [38]

Though the amount of money made does not show definitive foreknowledge – as billions could have been made from trading on a catastrophic event not just millions – it does suggest a strange confluence of interest, or as University of Illinois’s Professor Allen M Poteshman states from the conclusion of his own research: “… there is evidence of unusual option market activity in the days leading up to September 11 that is consistent with investors trading on advance knowledge of the attacks.” [39]

Financial parasites profiting from tragedy is quite different to Bush officials and intelligence agents having foreknowledge. The latter may be just another red herring as it not only offers credence to Al-Qaeda bogeyman as the evil enemy of apple-pie freedoms but serves to distance the common knowledge that successive US administrations have consistently supported Osama bin Laden’s Al-Qaeda network as part of their foreign policy agenda. The US military and intelligence Establishment have been complicit in providing continuity of this agenda. That being so, it immediately places “foreknowledge” of the attacks in quite a different light.

The above points have barely scratched the surface. So, before we go any further let’s remind ourselves of the key moments of the “Day of Infamy” with a timeline of September 11, 2001. [40]


 9/11 Timeline

7:59: Flight 11 takes off 14 minutes late
8:14: Flight 175 takes off 16 minutes late
8:20: Flight 77 takes off 10 minutes late
8:28: Flight 11 is confirmed as hijacked
8:37: Flight 11 enters New York control space; Boston flight control notifies NORAD
8:42: Flight 93 takes off 41 minutes late
8:46: Flight 11 hits the North Tower of the World Trade Centre
8:50: Flight 175 en route to New York City
8:54: Flight 77 strays off course
8:56: Flight 77 transponder signal disappears; Flight 77 disappears from radar screens
9:03: Flight 175 crashes into WTC South Tower; shown on international TV networks
9:06 Bush starts photo op at school; thinks WTC Crash Is Accidental
9:06-9:16: Bush told of second plane crash, continues photo op; reads pet goat story for almost ten minutes; Secret agents as per protocol do not remove him from the room; Ari Fleischer holds up sign saying “do not say anything yet”
9:16-9:29: Bush works on a formulating a speech with staff; no decisions are made
9:20: Barbara Olson, a passenger on Flight 77 is said to have called her husband Ted Olson, solicitor general at the Justice Department. Account is full of contradictions
9:28: Sounds of a struggle are heard at Cleveland Flight Control as Flight 93 is hijacked
9:29: Speech by Bush declaring a terrorist attack
9:30: Langley fighters take off toward Washington; Instead of arriving in the usual 6 minutes, they could reach city in six minutes but take 30 minutes. The jets were redirected east over the Atlantic Ocean and were 150 miles from the Pentagon when it is hit
9:30: After 25 minutes the Secret Service finally decide to hustle Bush out of the school
9:37: Flight 77 disappears from radar; Flight 77 crashes into reinforced section of the Pentagon
After 9:37: FBI confiscates film of Pentagon crash
9:40: Flight 93 transponder signal turned off; flight still closely tracked
9:42: Mark Bingham calls his mother From Flight 93
9:45: White House Evacuated
9:45 – 9:56 Counterterrorism ‘Tsar’ Clarke Initiates Continuity of Government Plan; Senior FAA Manager, on His First Day on the Job, Orders All Planes Out of the Sky Nationwide
9:45 – 9.58 Flight 93 passenger Todd Beamer speaks to GTE customer service supervisor Lisa Jefferson and FBI, gives contradictory statements
9:50: Molten metal pours from WTC South Tower
9:52: Fire-fighters reach 78th floor of South Tower; two isolated fires are found
9:55-10:15: Langley fighters reach Washington after considerable delay; contradictory accounts of time lag;
9:57: Passengers Begin Attempt to Regain Control of Flight 93
9:58: Call from Ed Felt on Flight 93, describes explosion
Before 9:59: Gold Transported Through WTC Basement; EMT Worker Given Message That WTC Towers Are Going to Collapse; High-Level Officials Evacuate Lobby of North Tower; Mayor Giuliani apparently told WTC towers will collapse when fire chiefs think otherwise
9:59: Explosions heard in South Tower just before collapse; South Tower of WTC collapses into its own footprint
9:59-10:28: Fire-fighters receive no messages to evacuate North Tower
10.00: Hijackers respond to passenger revolt
10:06: Flight 93 crashes into a Pennsylvanian field; Reports of light 93 Breaking Up Prior to Crash; timing of the crash disputed
Before/After 10:06: Second plane, described “as a small, white jet with rear engines and no discernible markings,” is seen by at least ten witnesses over the crash site within minutes of United Flight 93 crashing.
After 10:06: Fighter flies past Flight 93 crash site; witnesses report lack of plane wreckage at Flight 93 crash scene
After 10:06: Bush is told of Flight 93 crash, wonders if it was shot down
10:15: Pentagon Section Collapses
10:28: WTC North Tower collapses; Many witnesses hear explosions during the collapse of the north WTC tower.
11:45: Air Force One, with President Bush on board, lands at Barksdale Air Force Base
12:00 Noon: Senator Hatch repeats intelligence community’s conclusion that Osama bin Laden is responsible
After 12:00 Larry Silverstein Tells fire department commander to ‘pull’ WTC 7
12:16 US airspace cleared of all civilian aircraft
13:02: Defence Secretary Rumsfeld Calls for War; President Bush Says there will be a counterattack
14.00 – 14:30 Chief Fire Officer makes decision to abandon WTC 7
14:50 President Bush arrives in Nebraska; enters Strategic Command Centre
14:40 Rumsfeld is told Al-Qaeda was behind 9/11 attacks but wants to blame Iraq
16:30: WTC Building 7 Area Is Evacuated Due to Anticipated Collapse
17:20: WTC Building 7 Collapses; Cause Remains Unclear
18:42 Rumsfeld, Shelton, White, and Senators give news briefing on attacks
18:54 President Bush returns to White House
20:30: President Bush gives third speech, declares Bush Doctrine
21:00: President Bush meets with advisers, declares war without barriers
23:30: President Bush sees 9/11 as New Pearl Harbour

Notes

[1] ‘Hugo Neu and the Giuliani Partners Who Destroyed the Steel of 9/11’ April 18, 2011, By Christopher Bollyn, http://www.bollyn.com
[2] ‘Most 9/11 Commissioners Don’t Buy The Official Story – Why Do You?’ 9/11 Blogger http://www.youtube.com/watch?v=GdqIzc4TZAY
[3] ‘Comments on the Pentagon Strike’ By Laura Knight-Jadczyk, September 25, 2002. | http://www.cassopaeia.org
[4] ‘FBI Knew Terrorists Were Using Flight Schools’ By Steve Fainaru and James V. Grimaldi
Washington Post Staff Writers , September 23, 2001; Page. | ‘FBI Chief Acknowledges FBI Errors’CBS News May 30 2002 /updated 2009.
[5] ‘Why I Resigned From the CIA’ by Michael Scheuer, The Los Angeles Times, December 05, 2004. | ‘Many Say U.S. Planned for Terror but Failed to Take Action’ The New York Times, December 30, 2001.
[6] ‘Hijackers Got Visas With Little Scrutiny, GAO Reports’ By Dan Eggen, Washington Post, October 22, 2002; Page A07.
[7] ‘Alleged Hijackers May Have Trained At U.S. Bases’ Newsweek, Sep 14, 2001.| ‘Alleged 9/11 Hijackers Trained at U.S. Military Bases?’ 2nd Witness Arrested 25 Held for Questioning by Guy Gugliotta and David S. Fallis Washington Post, September 16, 2001; Page A29.
[8] ‘9/11 Hijackers Still Alive’ by Dominic Kenndy / Suicide hijackers hid behind stolen Arab identities; America at war: New York agony; Terror in new York, Edition 5LTHU 20 SEP 2001, Page 3. “Five of the hijackers were using stolen identities, and investigators are studying the possibility that the entire suicide squad consisted of impostors. Details are emerging of the killers’ humdrum final weeks in the US suburbs – joining gyms, eating pizzas and visiting an “adult video” store.”
[9] ‘NORAD had drills of jets as weapons,’ By Steven Komarow and Tom Squitieri, USA Today, April 19, 2004. | ‘A Nation Challenged: Warnings; Earlier Hijackings Offered Signals That Were Missed’ By Matthew L. Wald, The New York Times, October 3, 2001.
[10] p.68; The New Pearl Harbor – Disturbing Questions about the Bush Administration and 9/11 by David Ray Griffin Published by Olive Branch Press; 2004 | ISBN 1566565529.
[11] ‘Fried Rice: Condi’s Coming 9/11 Firestorm’ Perspectives, February 11, 2005 | ‘Terrorist Plan to Use Planes as Weapons Dates to 1995’ WTC bomber Yousef confessed to US agents in 1995. Public Information Center. December 8, 2002.
[12] op. cit Griffin.
[13] Miami Science Museum www. miamisci.org/ – c/o alienscientist.com ‘Probability of 7/7 War Games and Attacks happening at the same time (Impossible)’ September 2011.
[14] London Underground Bombing ‘Exercises’ Took Place at Same Time as Real Attack – Culpability cover scenario echoes 9/11 wargames by Paul Joseph Watson & Alex Jones/Prison Planet | July 13 2005.
[15] ‘New NSA docs contradict 9/11 claims’ By Jordan Michael Smith, Salon.com Jun 19, 2012.
[16] ‘Resentful west spurned Sudan’s key terror files’ War on Terrorism – Observer special The secret war. Part 1 By David Rose, The Observer, Sunday 30 September 2001. | ‘Revealed: The Taliban minister, the US envoy and the warning of September 11 that was ignored’ By Kate Clark in Kabul, The Independent, 07 September 2002. | ‘Report cites warnings before 9/11’ CNN News, September 19, 2002.
[17] op. cit. Griffin, (p.70)
[18] Ibid.
[19] ‘The Kingdom and the Towers’ By Anthony Summers and Robbyn Swan Vanity Fair, August 2011.
[20] ‘Two Suspected Charities Apparently Protected by Saudi Government Ties’ October 12, 2001. historycommons.org timeline.
[21] ‘September 11 2001: How much the French knew’ by Guillaume Dasquié Le Monde (Paris) April 15, 2007. | ‘The House of bin Laden – A family’s, and a nation’s, divided loyalties’.by Jane Mayer, The New Yorker, November 12, 2001. “two of Osama’s sisters apparently taking cash to an airport in Abu Dhabi [United Arab Emirates], where they are suspected of handing it to a member of bin Laden’s al-Qaeda organization.”
[22] ‘Ex-Spook Sirrs: Early Osama Call Got Her Ejected’ by Gail Sheehy New York Observer, March 2004.
[23] Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 by Steve Coll, Published by Penguin books, 2004. ISBN-10: 0143034669 (p. “Robin Raphel, Deputy Secretary of State for South Asia, speaks to the Russian Deputy Foreign Minister about Afghanistan. She says that the US government ‘now hopes that peace in the region will facilitate US business interests,” i.e. the Unocal gas pipeline from Turkmenistan through Afghanistan to Pakistan. (p.330).
[24] op. cit. Sheehy; New Yorker.
[25] op. cit. Griffin (p.152)
[26] ‘Bin Laden Kin Flown Back to Saudi Arabia’ by Kevin Cullen, The Boston Globe, September 20, 2001.Page: A29. | ‘A |Nation Challenged: The Family. ‘Fearing Harm, Bin Laden Kin Fled From U.S.’ The New York Times, By Patrick E. Tyler, September 30, 2001. | ‘Has someone been sitting on the FBI?’ By Greg Palast, Newsnight programme for the BBC. Transcript at BBC News: http://news.bbc.co.uk/1/hi/events/newsnight/1645527.stm November 6, 2001.
[27] op. cit. Perspectives, 2005.
[28] ‘Defence redefined means securing cheap energy’ The Sydney Morning Herald, December 26 2002.
[29] ‘CIA agent alleged to have met Bin Laden in July’ French report claims terrorist leader stayed in Dubai hospital, by Anthony Sampson, The Guardian, 1 November 2001. | ‘Ailing bin Laden ‘treated secretly for kidney disease’ By Adam Sage, Times of London Edition 5L November 2001, Page 5.
[30] ‘Hospital Worker: I Saw Osama’ CBS News February 11, 2009.
[31] ‘Mysterious September 11 Breakfast Meeting on Capitol Hill’ by Michel Chossudovsky Global Outlook,Winter 2003, http://www.globalresearch.ca,August 4, 2003. |
[32] ‘India helped FBI trace ISI-terrorist links’, The Times of India, 9 October 2001. | “French author Bernard-Henri Levy later claims to have evidence from sources inside both Indian and US governments of phone calls between Sheikh and Mahmood Ahmed, head of Pakistan’s Inter-Services Intelligence agency, during this same time period, and he sees a connection between the timing of the calls and the money transfers (see Summer 2000). [Frontline, 10/13/2001; Daily Excelsior (Jammu), 10/18/2001; Levy, 2003, pp. 320-324] From historycommons.com.
[33] ‘Bush: Memo had no “actionable intelligence”’CNN, April 12, 2004. | Declassified and Approved for Release, 10 April 2004 – ‘Bin Ladin Determined to Strike in US’ “Clandestine, foreIgn government, and media reports indicate Bin Ladin since 1997′ has wanted to conduct terrorist attacks in the US. Bin Ladin implied in US televisioni nterviews in 1997 and 1998 that his followers would follow the example of World Trade Center bomber Ramzi Youse! and ‘bring the fighting to America.’” http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB116/pdb8-6-2001.pdf
[34] ‘Willie Brown Got Low-Key Early Warning About Air-Travel’ by Philip Matier and Andrew Ross, San Francisco Chronicle, September 12, 2001 | ‘Contingency planning Pentagon MASCAL exercise simulates scenarios in preparing for emergencies’ by Dennis Ryan MDW NEWS 3 Nov 2000 http://www.globalresearch.ca 3 April 2004.
[35] op. cit. Griffin (p.70)
[36] Ibid.
[37] ‘We’ve Hit the Targets’ By Michael Hirsh, Newsweek, Sept. 13 issue, 2003. […] “Could the bombers have been stopped? NEWSWEEK has learned that while U.S. intelligence received no specific warning, the state of alert had been high during the past two weeks, and a particularly urgent warning may have been received the night before the attacks, causing some top Pentagon brass to cancel a trip. Why that same information was not available to the 266 people who died aboard the four hijacked commercial aircraft may become a hot topic on the Hill.” | ‘German Firm Probes Final World Trade Center Deals’ Reuters, December 17, 2001. | ‘Insider Trading Apparently Based on Foreknowledge of the 9/11 Attacks, The Times,(London) September 18, 2001.
[38] ‘Insider Trading Pre-9/11 Put Options on Companies Hurt by Attack Indicates Foreknowledge’ 911 Research, http://www.911research.wtc7.net
[39] ‘Unusual Option Market Activity and the Terrorist Attacks of September 11 2001.’ By Allen M. Poteshman. University of Illinois. http://www.scribd.com/doc/11079387/Unusual-Option-Market-Activity-and-the-Terrorist-Attacks-of-September-11-2001
[40] Grateful assistance from that wonderful online resource: wwwhistorycommons.org 911 and other related timelines and reports which made up the summary.

The Terror Industry (1)

By M.K. Styllinski

 If you’re submitting budget proposals for a law enforcement agency, for an intelligence agency, you’re not going to submit the proposal that ‘We won the war on terror and everything’s great,’ cuz the first thing that’s gonna happen is your budget’s gonna be cut in half. You know, it’s my opposite of Jesse Jackson’s ‘Keep Hope Alive’—it’s ‘Keep Fear Alive.’ Keep it alive.”

former FBI assistant director Thomas Fuentes


twin-towersIt took over 35 years for the majority of Americans to realise that factions within their own government assassinated John F. Kennedy. Not exactly a hopeful premise from which to start. It was at this juncture that the ground was laid for a more serious threat to the freedoms of not just the American Republic but to the stability of the whole world. More than 14 years have passed since the September 11 attacks and more people than ever are studying the official story and coming away with many more questions than answers.

Opinion polls on 911 vary greatly, both in terms of the questions asked and the size of the number of respondents. Back in 2006 more than a third of the American public suspected that federal officials assisted in the 9/11 terrorist attacks or took no action to stop them so the United States could go to war in the Middle East. [1] One in seven people in the UK believe the US government staged 9/11 and a recent poll sponsored by the German magazine Welt der Wunder resulted in 89 percent of the respondents saying they don’t believe the US government has told the whole truth about 9/11. [2] Interestingly, for the purveyors of State protection, a 2012 online poll by The Franklin Centre Library revealed that 77 percent thought 11 years after 9/11 that we were all less safe than before. [3]

With 75 top professors and leading scientists claiming  9/11 was ‘inside job’ in 2014, it appears academia is catching up with the public, though at a snails space. A more respectable 2,322 architects and structural engineers have also expressed their disbelief in all or some of the aspects of the official story over at Architects & Engineers for 9/11 truth (ae911truth.org/). There are hundreds of other 9/11 website organisations and non-profit educational charities who take issue with the governments version ranging from grassroots to academic.

The online encyclopedia of Wikipedia, (censored and guarded by suitable official story gatekeepers) provides the best summary of the US government and media-led “conspiracy theory” which has lodged itself in the public mind. The following represents the standard synopsis which is constantly wheeled out from media outlets and taken as the consensus.

Once upon a time…

“The September 11 attacks (also referred to as September 11, September 11th, or 9/11) were a series of four coordinated suicide attacks upon the United States in New York City and the Washington, D.C. areas on September 11, 2001. On that Tuesday morning, 19 terrorists from the Islamist militant group Al-Qaeda hijacked four passenger jets. The hijackers intentionally flew two of those planes, American Airlines Flight 11 and United Airlines Flight 175, into the North and South towers of the World Trade Center complex in New York City; both towers collapsed within two hours. The hijackers also intentionally crashed American Airlines Flight 77 into the Pentagon in Arlington, Virginia, and intended to pilot the fourth hijacked jet, United Airlines Flight 93, into the United States Capitol Building in Washington, D.C.; however, the plane crashed into a field near Shanksville, Pennsylvania, after its passengers attempted to take control of the jet from the hijackers. Nearly 3,000 people died in the attacks, including all 227 civilians and 19 hijackers aboard the four planes. At the time of the attacks, media reports suggested that perhaps tens of thousands might have been killed, and the total number of casualties remained unclear for several days.

Suspicion quickly fell on Al-Qaeda, and in 2004, the group’s leader, Osama bin Laden, who had initially denied involvement, claimed responsibility for the attacks. Al-Qaeda and bin Laden cited U.S. support of Israel, the presence of U.S. troops in Saudi Arabia, and sanctions against Iraq as motives for the attacks. The United States responded to the attacks by launching the War on Terror and invading Afghanistan to depose the Taliban, which had harbored Al-Qaeda. Many countries strengthened their anti-terrorism legislation and expanded law enforcement powers. In May 2011, after years at large, bin Laden was located and killed.” [4]

So, let’s get this straight…

… What we are being told is that a handful of mostly Saudi Arabians without military or intelligence training, acting independently of government or Intel agencies, managed to outsmart the whole Anglo-American Intelligence network, Israel’s MOSSAD and NATO; as well as the National Security Agency with its massive surveillance of connected networks spanning the globe. Let’s add to this the so-called “failures” from the National Security Council; US Airport security; NORAD, Air Traffic Control and the US Air Force. Let’s not forget the world’s most powerful defence system overseen by the world’s greatest superpower which just happened to allow a handful of Arabs with minimal pilot’s training, armed with box-cutters fly two jumbo jet airliners into the financial heart of downtown New York exploding into the most famous icons of world trade, whilst another employed an impossible flight manoeuvre in order to crash into the military defence centre of the most powerful nation on earth. Then, just before Obama’s election time, Osama Bin Laden, a known CIA asset and a former close business associate of the Bush family is conveniently found after over a decade of being “on the run”. Despite being the most wanted terrorist on earth, he is not questioned – like so many in Guantanamo Bay who appear to be mostly innocent yet tortured nonetheless – he is assassinated and promptly dumped at sea. Mission accomplished.

dreamstime_s_21682504

© Rkaphotography | Dreamstime.com – US Wars Are State Sponsored Terrorism Photo

That has to be the worst conspiracy theory ever to insult the intelligence of a sixth grader.

Yet, that is the official story we are expected to accept – without question. Most shocking of all, that’s exactly what so many people do: accept a story that simply cannot be true. Moreover, to add insult to injury and the memory of the dead, no proposal for an independent investigation into why the most monumental “failure” in National Security could have happened has arisen from the President, Congress, the Joint Chiefs of Staff or the MSM; nor has anyone been reprimanded, let alone prosecuted. The reality has been constant resistance, stone-walling, disinformation, propaganda, threats, suicides, and murders. Add to the mix are the corrupted commissions and inquiries whose only remit is to push the official story that must be made to fit into official culture. Of course, such a coup d’état could never have been accomplished if societies hadn’t been suitably tenderized by decades of social engineering. Part of that success has been due to the global War on Terror, or “overseas contingency operations” as Obama likes to call it.

Al-Qaeda and the global war on terror is the continuance of a “Strategy of Tension,” which refers to a period in Italy from 1969 to 1974, which suffered a series of terrorist attacks with heavy civilian casualties. It was an offshoot of what has been called Operation Gladio and their state-sponsored terror teams in Europe. [5] The strategy had its roots in fascist beliefs of Synarchism within government, military and intelligence networks. Their objective was to ruthlessly exploit underlying fears and grievances in European nations so that people would believe that the attacks were carried out by a communist insurgency within Europe. Many of these terrorist organisations went underground and resurfaced to be periodically stimulated by their masters for bespoke objectives. They do not just arise out of the blue. Much like the ebb and flow of paedophile and sex abuse networks, terrorist atrocities are given the required camouflage so that the perpetrators and their handlers remain in the shadows.

There are many populist and academic sources that will prove the phoney nature of Al-Qaeda and Osama Bin Laden. Of particular note is the acclaimed UK documentary The Power of Nightmares by Adam Curtis Top where CIA officials openly admit that the creation and history of Al-Qaeda as a terrorist network is a fabrication. [6] As former French intelligence officer Major Pierre-Henry Bunel confirms:

“The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.” [7]

The CIA has used this ghost to buttress the fantasy that is Al-Qaeda (and the new proxy private army called ISIL), employing fake media reports and video appearances clearly from persons other than bin Laden himself which have fed into the aftermath of the new pearl harbour that was 9/11. [8] Even the name of “Al-Qaeda/Al-Qaida” has produced confusion, even dark amusement in Arab circles as one commentator wryly observed: “You have heard before that ‘Al-Qaeda’ roughly translates into ‘the base,’ but were you aware that ‘Ana raicha Al Qaeda’ is Arabic colloquial for ‘I’m going to the toilet’? Would hardened terrorists hell bent on the destruction of the west name their organization after a euphemism for taking a shit?” [9]

A fair point.

The common tactic that has been referred to before is known as the Hegelian Dialectic, though in truth Hegel described social changes rather than pointed manipulation in this context. However, it serves a suitable framework for the thinking behind state-sponsored terrorism which goes something like this:

1. The government creates or exploits a problem then attributes blame to others.

2. The populace react by asking the government for protection and help.

3. The government offers the solution that was planned long before the crisis.

4. Outcome: Rights and liberties are exchanged for the illusion of protection and help.

This is the geopolitical paradigm of our times largely unknown by the public, though thanks to the internet this is gradually changing. Government and military agencies at the mid to lower levels are equally unaware of this old formula which writer G. Edward Griffin described as: “… not a war on terrorism to defend freedom, but a war on freedom that requires the defense of terrorism.” [10] Meantime, the PR from the MSM and academia is still pushing the idea that America and Europe are overrun with teeth-gnashing terrorists hell-bent in renting asunder the fabric of our Western way of life. Since what is left of any civil rights in Europe and the US constitution has been eviscerated by the very same authorities who peddle these myths then might there be some mileage in the idea that they have something to gain from it all? For anyone who has taken the time to research the genesis of terrorism and the present-day nonsense passing for terrorist laws in the United States it is beyond doubt that the only thing American and European people need to fear is their governments.

According to a basic statistical analysis from 2013 the actual percentage of the US population who may be classified as a terrorist is around 0.00016%, or about 1 in 624,297 people. In this context, the writer Marc Salvo makes a pertinent observation about this topsy-turvy terror game when he said just a few months ago: “We’re not suggesting that terrorism doesn’t exist, but considering that 1 in 1000 Americans in 2010 were the subject of police misconduct ranging from excessive force beatings and murder to sexual assault and false arrest, perhaps the government should turn its surveillance on itself, rather than the 99.9% of Americans who want nothing more than to be left alone.” [11]

That is not to say there are not genuine terrorist plots, but the key issue here is what prevents terrorism from occurring and what actively encourages it? We know that invading Syria or Iraq has provided a massive surge of terrorist cells in those countries as a result and a bleed-through must have occurred in America and Europe. However, like some police trawling and entrapment operations in the UK, the lines between what is a genuine terrorist plot and creating home grown fanatics is more than blurred, it continues to stoke the needed fear and high profits necessary to sustain a terror industry.

As Al-Qaeda is wound down, ISIS takes over, funded with billions of dollars: a new brand with new bloody atrocities to market …

 


Notes

[1] ‘New National Poll: 36percent of Americans Believe 9/11 Was an Inside Job’ By Thomas Hargrove, Scripps Howard News Service Seattle. August 2, 2006.
[2] ‘One in seven believe U.S. government staged the 9/11 attacks in conspiracy’- The belief is more common among younger people, with a quarter of 16 to 24-year-olds subscribing to the theory By Alanah Eriksen, Daily Mail, 29 August 2011 | ‘German Poll: 89percent Question 9/11’ Welt-der-Wunder, January 24, 2011, 9/11 Truth News.
[3] ‘9/11 Online Poll’ The Franklin Center, September 11, 2012. http://www.franklincenterblog.wordpress.com
[4] ‘September 11th Attacks’www.wikipedia.com ( A far better starting point for an alternative “wikipedia” version of 9/11 can be found at wikispooks.)
[5] “Operation Gladio is undisputed historical fact. Gladio was part of a post-World War II program set up by the CIA and NATO supposedly to thwart future Soviet/communist invasions or influence in Italy and Western Europe. In fact, it became a state-sponsored right-wing terrorist network, involved in false flag operations and the subversion of democracy.
The existence of Gladio was confirmed and admitted by the Italian government in 1990, after a judge, Felice Casson, discovered the network in the course of his investigations into right-wing terrorism. Italian Prime Minister Giulio Andreotti admitted Gladio’s existence but tried to minimize its significance.
The main function of the Gladio-style groups, in the absence of Soviet invasion, seems to have been to discredit left-wing groups and politicians through the use of “the strategy of tension,” including false-flag terrorism. … The aim was to instill fear into the populace while framing communist and left-wing political opponents for terrorist atrocities.” – Operation GladioNATO/CIA “Stay-Behind” Secret Armies/ Truth Move / International Truth Movement, http://www.truthmove.org/content/operation-gladio/
[6] A partial listing for your own research follows: The Power of Nightmares BBC documentary by Adam Curtis. This is freely available to watch from various sources on the internet. ‘Al Qaeda and the ‘War on Terrorism’’ By Michel Chossudovsky, January 20, 2008. The Centre for Global Research: http://www.globalresearch.ca/PrintArticle.php?articleId=7718 and read the updated version of his 2005 book: America’s War on Terrorism by Michel Chossudovsky,| ISBN 0-9737147-1-9 2005. wwwglobalresearch.ca.: “…new chapters focuses on the use of 9/11 as a pretext for the invasion and illegal occupation of Iraq, the militarisation of justice and law enforcement and the repeal of democracy. According to Chossudovsky, the ‘war on terrorism’ is a complete fabrication based on the illusion that one man, Osama bin Laden, outwitted the $40 billion-a-year American intelligence apparatus. The “war on terrorism” is a war of conquest. Globalisation is the final march to the “New World Order”, dominated by Wall Street and the U.S. military-industrial complex. September 11, 2001 provides a justification for waging a war without borders. Washington’s agenda consists in extending the frontiers of the American Empire to facilitate complete U.S. corporate control, while installing within America the institutions of the Homeland Security State.” | See also: ‘Divide and Conquer: The Anglo-American Imperial Project’ by Andrew G. Marshall, Global Research, July 10, 2008 and ‘The Myth Of The Palestinian Suicide Bomber’ By Joe Quinn, Sott.net, 29 Jan 2007.
[7] ‘Al Qaeda: The Database’ by Pierre-Henry Bunel, Wayne Masden report November 18 2005. “In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith.”
[8] ‘Researcher: Bin Laden’s beard is real, video is not’ – Digital evidence supports the theory that Al-Qaida is recycling old footage to create new messages. Cnet.com September 12, 2007.
[9] ‘Existence of ‘Al-Qaeda’ Is Crap; Quite Literally’ – Did Osama really choose to name his terror network after potty humor or was it a computer database he used to chat with his CIA handlers? By Paul Joseph Watson, PrisonPlanet.com| October 6 2006: “The origins of the name “Al-Qaeda,” and its real arabic connotations prove that every time the Bush administration, Fox News, or any individual who cites the threat of ‘Al-Qaeda,’ as a mandate for war and domestic authoritarianism, they are propagating the myth that such a group ever existed.
An organization by the name of “Al-Qaeda” does not exist and has never existed outside a falsely coined collective term for offshoot loose knit terror cells, the majority of which are guided by the Pakistani ISI, Mossad, the Saudis, MI6 and the CIA, that were created in response to America’s actions after 9/11 – as the recent NIE report shows. According to the BBC documentary The Power of Nightmares, the infamous footage of Bin Laden marching around with armed soldiers was a ruse on the part of Osama himself, graciously propagated by the lapdog press, in which actors were hired off the streets, given uniforms and guns and told to look aggressive.” […]
[10] ‘The Chasm: The Future Is Calling’ (Part One) by G. Edward Griffin 2003, Revised March 17, 2011.
[11] ‘Odds That You Are a Terrorist: 1 in 624,297’ By Mac Slavo, SHTFplan.com, October 18th, 2013.

Save

9/11: The Point of No Return?

By M.K. Styllinski

 “Let us never tolerate outrageous conspiracy theories concerning the attacks of September the 11th; malicious lies that attempt to shift the blame away from the terrorists themselves, away from the guilty.”

 – President G.W. Bush, at the United Nations, November 10, 2001


9-11_Truth_2Note: Let it be said right at the start: I am no 9/11 scholar. This is merely an attempt to refresh our minds about the nature of the September 11th attacks in the context of an emerging Pathocracy and the subjects previously discussed. Therefore, what follows in this series is in no way a comprehensive analysis of what is, after all a vast topic. That said, as part of an exploration of why humanity stands at the threshold of massive change, it would be foolish not to include a summary of the key elements involved in such a global marker. I hope the following posts help to at least clarify the subject for those beginning to take a serious look at the nature of our reality in this context.


September 11th 2001 and the World Trade Centre attacks are a signpost in the fortunes of social control. It was the day – perhaps more than any other in the last two hundred years – that saw geo-strategy and our societies change for the worse. With any major act of synthetic terror there is a window of opportunity to perceive the objective reality behind the noise and smoke before Official Culture brings the shutters down once more. Since 2001, anyone who has taken the time to carefully sift through the discrepancies, distortions and obvious lies of the official conspiracy theory will have to navigate through the minefield of individual and collective belief as to how the world works. We bridle at accusations that our thinking is often just second or third hand opinion lifted from mainstream radio, T.V., newspapers or blogs. Seldom do we truly question what we are being force-fed through the constant osmosis of “news”. What the mainstream media (MSM) and most of current academia believe doesn’t just impinge on our own evaluations but very often exclusively determines the quality and direction of our opinions. This is why the media has such a crucial role to play in the correct presentation and dissemination of information.

Unfortunately, we cannot trust the MSM to provide unbiased and objective analysis due to a variety of conflicting interests from corporate, government and Psychological Operations teams (PSYOPS) embedded in media institutions for decades and the internet since its inception. Our news is layered over with self-censorship and journalistic pride that will not touch subjects deemed taboo for fear of losing their job or even worse, losing respect and prestige so coveted in their respective fields. As a result, there are well-known journalists and academics for which the subject of 9/11 is off-limits because it is has evolved into such a “hot potato” of controversy that to address it would mean the end of their social standing.

It is also true that certain persons still operate from a hopelessly juvenile dictionary which they still prefer to use when appraising personal and external realities. They derive comfort in overly simplistic versions of national and international events, despite the apparent expertise and erudition in their chosen field. Their beliefs come first and reality is tailored towards it. They cannot and will not sanction the idea that a coup d’état could have taken place on September 11th and no amount of reasoning will alter such a position. The often smug, post-modern denials and ad hominem attacks are used as a battering ram against those wishing to find the truth and if you start to make some headway in connecting the dots you will likely be on the end of carefully targeted character assassination by the fearful and ill-informed.

Official Culture determines what is or isn’t possible regarding the nature of governments and the military-intelligence apparatus, which means an almost impenetrable wall preventing critical analysis and reasoned discourse. What is now labelled the 9/11 Truth Movement is no exception, having been thoroughly infiltrated by paid CoIntelpro agents tasked with sowing the seeds of in-fighting and disinformation.

Talk show host and “king of conspiracy theory”, Alex Jones is a prime example. Famous for his cringe-making rants and bombastic behaviour and extremely commercial internet websites, he manages to switch off anyone interested in discovering the objective truth about our world, though he naturally appeals to those of high school age just waking up to the world.  Jones exists to hoover up any and all information pertaining to conspiracy-related topics and thus helps to tarnish these subjects by association. If he happens to get invited on mainstream television he is so over the top and reactionary that any rational conversation is impossible. This is how CoIntelpro works: whether a conscious or unconscious agent, both will assist to deflect, distort and disinform.

alex_jones

Alex Jones Talk show host and “conspiracy king”.

Similarly, Go to the internet pages of the very popular encyclopaedia Wikipedia and search for the pages on 9/11 and you will come away thinking that the 9/11 Truth Movement is inhabited only by delusional nerds, that the official story is beyond repute and supported by cast-iron facts. Wikipedia is visited by millions of people every day who might be persuaded by the obviously skewed presentation; where voluminous pages expound on the official story, affording little time for critical appraisal and alternative arguments.

In reality, there are many well qualified, experienced, rational and sincere persons for whom the official story of 9/11 does not and cannot possibly be anything but a fictional account. Anyone who approaches the subject with an open but skeptical mind and are able to think critically about this issue will inevitably come away with the disturbing conclusion that something is very wrong with the narrative we have been sold. Yet, there is a constant maintenance of the official story by the MSM and governments world-wide.

Once you start digging, the propaganda, blatant lies, fallacies and distortions are so painfully obvious to those who take the time, that it becomes truly shocking how deeply managed our culture truly is. And be assured, you don’t have to go very far before the central premise of the official story shows itself to be no more than a house of cards waiting to tumble. But fear is the cement upon which the bricks of belief can be constructed. And it is sometimes terrifying to have all that one thought good and true scattered to the wind. But it must be done if we are to have any hope at all going beyond an illusion of democracy.


“I Believe…”

Two words which have determined the course of history.

We humans have a curious predisposition to seek belief instead of facts. All actions or non-actions are based around either direct verification by experience and attention to supporting evidence or a preference for belief which includes neither. Belief systems set a demarcation line that cannot be crossed. One is happy in one’s belief and reality defines it.  Our wishful thinking tends to offer temporary comfort from the demons in our subconscious shadows. The wish to believe provides it with a formal structure which we can re-affirm in the outer world, surrounding ourselves with others who have chosen the same “consensus” through which to live their lives. Threats to those constructs are often resisted with logical fallacies and emotional reactions:

“Because the Bible says so and the Bible is the word of God.”

“I believe in Science. If there is no empirical proof then as far as I’m concerned, it doesn’t exist.”

“You don’t believe in all that 911 conspiracy theory nonsense do you?”

Peer groups and tribal memberships provide a rich reservoir of socio-cultural knowledge offering a ready template for custom-made ideologies. This is gradually adapted to one’s own personality and conditioned by long-term memory. If it fits with our need to survive in society, perhaps buffering us from pain, fear and uncertainty, then our social position, values, and objectives will conform to it. Conformity – at whatever degree or level – is a defining factor accompanied by a dictionary of interpretation which must exclude other forms of knowledge. When such a dictionary becomes out-dated and in conflict with the facts – even though new knowledge lies alongside it – that interpretation becomes a juvenile one, locked into the past and resistant to change.

Change, as we all know, can be very painful.

dreamstime_m_20965675© Krutoeva | Dreamstime.com – Through Rose Colored Glasses Photo

When assumption and ignorance are chosen as a way to protect ourselves from uncertainty, responsibility and unpleasant memories then abstract ideas provide the tool for social engineering and the seeds for ponerological influences. It logically follows that one’s beliefs can facilitate directions which – though founded on good intentions and “Christian principles” – may not be in the individual’s, groups’ or societies’ best interests. Any belief tends to reduce the potential for creative choices by limiting the field of awareness and therefore the quality of consciousness.

Psychopaths, social dominators and authoritarian personalities cling to their beliefs as a confirmation of their chosen, highly subjective reality. They serve any figure of authority be it a new age guru, academic lecturer or any type of leader that confers rewards for obedience. They prefer fantasy rather than what is, especially if, in the authoritarian’s case, it provides certainty against the unknown, however simplistic.

The psychopath will create reality according to his instinctive, primal desires which exclude all else. He will bend and force life into his twisted conceptions, whatever the cost and whatever the stakes. He turns the world into a poker game with guns and aces up his sleeve. Our wish to believe lends him momentum to achieve his goals; the projection of his self-belief is willingly received by those whose inner nature is vulnerable and without foundation. Belief restricts an open system of learning, which often includes suffering. Suffering accompanies self-growth as we discover what is, rather than what we would like it to be.

The world is conspiratorial by nature though this fact has been successfully glossed over by a combination of wishful thinking and perception management. After all, if you want to suggest that the government and its agencies have our best interests at heart then the denigration of those who offer an unprejudiced search for truth outside of traditional corporate controlled media is a standard tactic. It is also pertinent to mention recent university studies which reveal that the 9/11 official story “gatekeepers” fit the profile of irrational and emotionally unstable individuals when exposed to an alternative view of reality, no matter how sensible or logical that reality may be.  In June 17, 2013 online journal 21st Century Wire included a post entitled: ‘New studies: ‘Conspiracy theorists’ sane, while government dupes are crazy and hostile’. Psychologists Michael J. Wood and Karen M. Douglas of the University of Kent found that:

“The research … showed that people who favoured the official account of 9/11 were generally more hostile when trying to persuade their rivals.” […] “For people who think 9/11 was a government conspiracy, the focus is not on promoting a specific rival theory, but in trying to debunk the official account.”

In other words, the stereotype of the conspiracy theorist as lunatic, fringe-fanatic, in fact generally described those who defend the official conspiracy theory provided by the governments and their media outlets.

Political scientist Professor Lance deHaven-Smith’s book Conspiracy Theory in America (2013) published by University of Texas Press provides further insights into the term “conspiracy theory.”

It is a matter of historical record, albeit widely unknown, that the CIA embarked on an illegal propaganda campaign to circulate the phrase so that it became a pejorative term. (See: “In 1967, the CIA Created the Label ‘Conspiracy Theorists’ … to Attack Anyone Who Challenges the ‘Official’ Narrative). So, when people began to question the 1963 assassination of J.F. Kennedy they would be ridiculed and defamed thus providing a psycho-social protection for the subject. As we know, there is nothing more powerful than the herd instinct for self-preservation. In the Professor’s own words: “The CIA’s campaign to popularize the term ‘conspiracy theory’ and make conspiracy belief a target of ridicule and hostility must be credited, unfortunately, with being one of the most successful propaganda initiatives of all time.”

WTC_smoking_on_9-11

September 11th attacks on the World Trade Center’s Twin Towers, 2001.

Studies have also shown cognitive dissonance and “confirmation bias” dominates the perceptions of those who prefer to believe in the 9/11 official story and many other official versions of historical conspiracies, despite many of those “theories” since proven to have been conspiracy fact. While hard-core skeptics and self-avowed debunkers tend to exhibit an absolutist  persona backed up by a militant belief in materialist science, what may be at the root of this apparent quest to find the truth is nothing more than an abnormal emphasis on the left brain, a neurological deficiency which limits the ability to see beyond their own authoritarian beliefs. This was revealed in spectacular fashion by Professor Bob Altemeyer’s studies on authoritarian followers.

There remains today a wealth of information on the internet and in published books regarding the events of September 11th 2001. You may be one of those people who consider themselves open-minded and well-read, willing to take on new sources of information in order to learn about our world in order to expand your awareness. Although there has been a sea-change in collective awareness you would still be in the minority. When we approach the subject with an open but skeptical mind, and sift through the media and US government’s official story of September 11th, then we will come up against a “conspiracy theory” that is logically inconsistent, defies the laws of physics, flies in the face of rational, deductive observations and fails to explain the reasons and causes of these events on so many different levels that we will likely suffer a change in our world-view. Depending how inured one is in Official Culture this will result in two emotional responses and the choices which must follow:

1) Shock and cognitive dissonance as a result of one’s cherished beliefs about the world coming under attack and the fear and stress induced. A shoring up of those beliefs may occur, calling a halt to any further research and a determined crystallisation of the official story. Depending on how deep the threat to one’s beliefs the information presents, the seeking out of groups and persons who can bolster and buffer those beliefs will take place where ridicule, disinformation and authoritarian precepts rule the day. No matter how illogical or irrational the stance, nothing must be allowed to penetrate these beliefs since they are bound up with identity.

2) A period of disbelief and sadness, perhaps even an initial rejection, followed by an interlude of reflection and soul-searching. This might lead to a re-visiting of the subject and the determination to find answers. The choice is made to seek a better understanding of the issues involved and arrive at more objective appraisal. The only way to do this properly is to network with others who have also recognised that something is seriously amiss.

That does not imply that all the answers are immediately forthcoming or even correct, only that the government story cannot be true and therefore a new, independent investigation must take place, however improbable such a possibility may be.

This brings us back to the idea that there are two types of people who will gravitate to either an a priori belief and the comfort it offers at the expense of truth, or the ability to think critically while maintaining an open mind – a healthy skepticism if you will. Authoritarians, drawn from both conservative and the liberal, function largely on emotions which are used to defend their worldview. The intent behind any assessment of new information is based not on the search for truth but the need to maintain that belief and thus to “feel good”. Unexamined assumptions inform the reality of fundamentalists or absolutists who prefer order and error to complex truth. Since irrational criteria is used for assessing facts which are filtered through the controlling belief, they cannot be aware of their own indoctrination and dogma.

9-11-2011A

Freedom lights anniversary (wikipedia)

Ideally, true critical thinkers, with a broad knowledge of many fields test the certitude of their conclusions. Experiential knowledge and networking without prejudice acts as the litmus test for evaluations. Lying to themselves does not feature and nor do manipulative appeals to the emotions. Impartiality and objective observation of each opposing camp is analysed while using their heads and their hearts to position themselves fairly, even if it leads to the break-down of a hidden bias or the discovery of a set of assumptions. They are aware of how easily it is to deceive themselves. This latter grouping is lacking in relation to the 9/11 inquiries and related fields – most especially ponerology.

This is what makes the events of 9/11 a highly controversial issue because it is not simply a matter of addressing the gargantuan holes in the government story; it is akin to peeling away the outer layers of an onion which can stimulate a parallel process to occur within ourselves. It is here that we find the crux of the challenge: this process of discovery is potentially more painful than simply pointing out errors in logical reasoning and scientific principles; far more sensitive than addressing social, cultural and geo-political justifications for why the official story doesn’t make sense. As you dig deeper you realise that what we considered to be truth and reality is turned upside down and that is akin to experiencing a form of withdrawal from our addictive, Official Culture. Our faith and trust in our valued institutions and the beliefs – so often based on a false interpretation of history – can be shaken to the core. So much so, that our world-view begins to unravel and thus our sense of self.

If you are one of those who consider themselves outside such cultural shocks then perhaps your particular belief hasn’t been discovered yet. The deceptions inherent in the 9/11 attacks may be easy for you to take on board but there are sure to be other “sacred cows” lying buried …We all have them. When we have not been suitably prepared and these revelations happen too quickly we can fall into loneliness, sadness and even depression as a result of knowing what we would rather not know, perhaps having shielded ourselves from what we knew to be true deep down. Or, we can go to the other extreme and become drunk on the new information, our intellect inflating to the extent it squeezes out emotional nuance and thus proper communication. We become trapped in that particular mirror and over identify with the subject in question, becoming fundamentalist in our quest. 

This is the greatest challenge to the uncovering of information and knowledge regarding 9/11 and other crimes, as it demands that we shine the light on the darkness in the outer world thereby highlighting our own inner complacency. Those factions within the Establishment who may have sanctioned and perpetrated the events of 9/11 rely on the fact that many will not go against a complex and tightly-woven set of beliefs and their societal constructs. This programming instinctively resists any attempts at disclosure and investigation in favour of the status quo. 

dreamstime_m_34143077

© Alphaspirit | Dreamstime.com – Businessman Like An Ostrich Photo

The events of 9/11 are unquestionably a rich field of discourse not just because the world changed into a more paranoid and dangerous place since that tragic event, but because the answers to so many questions about the role and function of government, the media and commerce lie within it. It is the central core from which various paths of deleterious influence fan out, and which can be traced back to providing tangible benefits to a select few. Machiavellian strategies are always in the shadows stimulating these collective traumas in the mass mind and suitably conditioned to accept the solutions proffered, however ridiculous. Qui bono always applies.

After the whitewash of the 9/11 commission, the still deafening silence of much of the MSM and infiltration of the 9/11 Truth Movement by CoIntelpro, it may be that researchers and investigative journalists have lost the initiative they might have had. Every year which goes by gives an advantage to those who perpetrated this ambitious crime. The dire consequences for the American people and for the world in general cannot be overstated. The present police state in the USA and geopolitical events in the Middle East and the Ukraine are testament to this fact.

Despite this, there is hope. More and more people are deciding to think critically about the events of that day and the surrounding geo-political narratives. It will be an arduous task to produce a consensus where it counts regarding the events of that day, let alone push for an independent investigation. Nevertheless, it is important to remember that our social systems have largely evolved to keep us compliant and docile and/or pathological and disturbed. The tranquility of mind and openness necessary to make informed choices on this subject must be hard won, especially when Establishment dynamics largely operate in secrecy along with policies in plain sight which require an understanding of their vocabulary and insider language. Thanks to independent internet journalism the blindfold might be slipping … slowly but surely.

As noted in previous posts, secrecy and conspiracy are the standard pillars holding up our Official Culture. A reminder from historian and researcher Richard M. Dolan will underscore the fact:

“Nearly everything of significance undertaken by the military and intelligence community in the past half-century has occurred in secrecy. The undertaking to build an atomic weapon, better known as the Manhattan Project, remains the great model for all subsequent activities. For more than two years not a single member of Congress knew about it, although its final cost exceeded the then incredible total of $2 billion. During and after the Second World war, other important projects, such as the development of biological weapons, the importation of Nazi scientists, terminal mind control experiments, nationwide interception of mail and cable transmissions of an unwitting populace, infiltration of the media and universities, secret coups, secret wars and assassinations all took place far removed not only from the American public, but from most members of Congress and a few presidents. Indeed, several of the most powerful intelligence agencies were themselves established in secrecy, unknown by the public or Congress for many years.” [1]

Undue secrecy and manipulation on the part of Empire always fails in the end, albeit going underground. The trick will be to predict how and when those roots may rise again. Hindsight is after all, a wonderful thing. But thanks to pioneers in the fields of psychopathy and ponerology we are now seeing a return to ancient wisdom, which, down through the ages may have been alerting us to the evil in our midst. That’s where a finely-tuned psycho-social conscience is crucial in preventing the ascendance of psychopaths in power, and when it becomes a matter of soul survival for the individual and his culture.

So, with this in mind, how did it get to a state of affairs where the American public (and much of the world) could so easily accept the Hollywood version of 9/11?

To answer this question, we must take a brief detour back to Mr. Edward Bernays who contributed to a very modern psychological coup against the US population and the consequent systematic dumbing down of its education.

 


Notes

[1] p.23; introduction; UFOs and the National Security State Chronology of a Cover-up – 1941-1973 (2002) By Richard M. Dolan. Published by Hampton Roads Publishing Co.

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 

Update: See also: Data is the New Oil

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

Technocracy XI: Social (SMART) Grid and “Cognitive Infiltration”

“A really efficient totalitarian state would be one in which the all-powerful executive of political bosses and their army of managers control a population of slaves who do not have to be coerced, because they love their servitude.”

Aldous Huxley, Brave New World


thSocial networking websites like Facebook, Twitter, Tumblr, Yahoo! and others have offered new ways to chat, make friends, speed-date and keep in touch with family wherever you are. It has revolutionized information in ways which we are only just beginning to understand. The networks have become such a normal part of our daily lives in such a short time that it is only recently that serious questions about privacy and surveillance have filtered through to the MSM. But ethical questions are being left behind as the Information Age surges ahead. Indeed, if you don’t have a Facebook account then you have already consigned yourself to the hinterlands of suspicion and abnormality. According to some, this may even be a red-flag for suspected terrorist or paedophile. Such is the power of social networking websites on society and the ridiculous assumptions now circulating. [1] $billion companies like Twitter and Facebook have become the largest database on the global population, representing a free and easy resource for intelligence agencies to data-mine. With over 900 million active users it is not difficult to see how useful data catchment could be.

Growing awareness that social networks are being used by intelligence agencies to monitor citizens’ activities prompted cyber-consumer advocate Electronic Frontier foundation (EFF) to file requests in October 2009 to provide records about federal guidelines on the use of social networking sites for investigative or data-gathering purposes. Among other issues related to surveillance as discussed previously, they sued the CIA, the US Department of Defence, Department of Justice and three other government agencies for allegedly refusing to release information on their involvement in social networks. The cases are on-going.

There are so many dubious aspects to Facebook aside from its intelligence connections and origins it is hard to know where to start. We will pinpoint a few however.

The company makes no secret of is its drive to know everything about its members. It wants to extract and mine as much the data from them as is humanely possible and then make it available to all kinds of interested parties. The implications of their drive to happily make your social life – including information you might not ordinarily reveal – fully integrated into the net experience is of course, never discussed. Facebook has been busily creating “Shadow Profiles” in a bid to extract even more information. Using various functions on the software interface which encourages users to share personal data of other users and non-users of Facebook such as mobile phone synchronization, search queries, friend invitations, email-provider imports and instant messaging means that even if you don’t use Facebook you may have a profile nonetheless. [2]

Since Facebook is such a fan of being “social by default” then it shouldn’t be concerned when the tables are turned. Since Facebook revealed in 2012 that more than 83 million Facebook accounts (8.7% of total users) were fake accounts, ongoing controversies with privacy issues, class action lawsuits and litigation as well as the virtual ownership of members’ profiles, it is hardly surprising this was reflected in the stock value which dropped below $20 in the same year. [3]


th“You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.”

– Facebook Terms of Service. (It has since been updated yet protests groups claim little has changed).


When independent software developer Pete Warden crawled all the data that Facebook’s privacy settings changes had made public, the company sued him. This occurred before the Open Graph API system which means they were planning to make the data publicly available anyway. As Vice President of Engineering at Border Stylo Dan Yoder comments: “Their real agenda is pretty clear: they don’t want their membership to know how much data is really available,” stating further: “It’s one thing to talk to developers about how great all this sharing is going to be; quite another to actually see what that means in the form of files anyone can download and load into MatLab.” [4]

In 2010, a Canadian security researcher Ron Bowes created a specific crawler script which he then used to take information from Facebook’s open access directory. He managed to download 2.8Gb of personal details including credit card numbers, account names, profile URLs and contact details; names of those users’ friends, (even with hidden profiles) and more intimate photos of over 100 million Facebook users. This cache of private information gold was then dumped on P2P file-sharing service BitTorrent, which was subsequently downloaded by scores of major corporations many hundreds of times. The point was not the relative ease by which such data was “stolen,” though this is an important issue, it was the fact that the data is already publicly available, provided Facebook members have not chosen to hide their profile from search results. [5]

As of 2012, there are now a raft of members, celebrities, underwriters and advertisers all taking a cut of Facebook profits. On the management board is co-founder and CEO Mark Zuckerberg with the largest ownership percentage of an individual at 28% (he is worth $33.1Billion) with co-founders Eduardo Saverin, Dustin Moskovitz, Sean Parker taking between 6-4%.  Venture capital company Accel Partners, Russian internet firm Mail du Ru take 10% repsectively and former PayPal CEO and venture capitalist Peter Thiel 3%. Thiel sums up Facebook’s history of double-dealing and entrepreneurship very well.

mark-zuckerbergCEO Mark Zuckerberg

The first lump sum from his venture capital funding amounted to $500,000 – a tidy sum no doubt drawn from his £3bn hedge fund Clarium Capital Management and a venture capital fund called Founders Fund. Thiel is the Author of an anti-multicultural missive The Diversity Myth and on the board of VanguardPAC a radical internet-based Neo-Conservative pressure group that was apparently set up to attack MoveOn.org, a left-liberal pressure group website. VanguardPAC’s mission is to “reshape America and the globe” according to Neo-Conservative values – the type of values which are still carving up the Middle East. Thiel is certainly not the shy and retiring type and promotes a New World Technocracy laced with transhumanist and right-wing conservatism. The Guardian’s Tom Hodgkinson summarises Thiel’s curious mélange of fascist views: “… since the 17th century, certain enlightened thinkers have been taking the world away from the old-fashioned nature-bound life, and here he quotes Thomas Hobbes’ famous characterisation of life as ‘nasty, brutish and short’, and towards a new virtual world where we have conquered nature. Value now exists in imaginary things.” [6]

pthiel1

Peter Thiel: Technocratic Neo-Conservative

From where did Theil obtain his inspiration? Stanford’s University’s René Girard and his mimetic theory that states all cultures and ancient societies were built on the victimisation and an eventual sacrifice of the innocent, even though they believed they were guilty. Mythology was used to legitimise and rationalise the fact that society was founded on violence. If Girard believes that people are sheep and will follow the one strongest in the herd then according to Hodgkinson:

“The theory would also seem to be proved correct in the case of Thiel’s virtual worlds: the desired object is irrelevant; all you need to know is that human beings will tend to move in flocks. Hence financial bubbles. Hence the enormous popularity of Facebook. Girard is a regular at Thiel’s intellectual soirees. What you don’t hear about in Thiel’s philosophy, by the way, are old-fashioned real-world concepts such as art, beauty, love, pleasure and truth.” [7]

Perhaps this is something that may be said for much of the neo-feudalist collectives currently infiltrating our social systems?

Consider the other board member of Facebook, Jim Breyer a partner in the venture capital firm Accel Partners who put $12.7m into Facebook in April 2005:

“…. On the board of such US giants as Wal-Mart and Marvel Entertainment, he is also a former chairman of the National Venture Capital Association (NVCA). Now these are the people who are really making things happen in America, because they invest in the new young talent, the Zuckerbergs and the like. Facebook’s most recent round of funding was led by a company called Greylock Venture Capital, who put in the sum of $27.5m. One of Greylock’s senior partners is called Howard Cox, another former chairman of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their website), this is the venture-capital wing of the CIA. After 9/11, the US intelligence community became so excited by the possibilities of new technology and the innovations being made in the private sector, that in 1999 they set up their own venture capital fund, In-Q-Tel, which “identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader US Intelligence Community (IC) to further their missions”. [8] [Emphasis mine]

With significant lobbying costs totalling over $41,000 in just one quarter of 2010 the focus of their expenditure was primarily intelligence agencies such as the Office of the Director of National Intelligence (DNI) and the Defence Intelligence Agency (DIA). It was the only internet company to do so out of Google, Amazon, eBay, Microsoft, Yahoo and Apple. The DNI is an umbrella office founded in the wake of 9/11 synthesizing intelligence from 17 agencies (including the CIA) and advises the President on privacy and federal cyber-security policy.

Which begs the question: Is Facebook lobbying merely to keep their operations free from interference for their Intel handlers?

Meanwhile, Facebook, Blogs, newspapers, radio TV channels, and internet chat rooms are poured over and monitored by the Open Source Centre or “vengeful librarians” – even the constant “tweets” from the Twitter network reaching over 5 million per day. Information is gathered by an army of analysts to find the low-down on the emotional level of a certain city demographic or whether a country is ready to be invaded or …”Democratised.”

facebooklogin1


 “Facebook is not your friend, it is a surveillance engine.”

– Richard Stallman, software freedom activist


It is now common knowledge that The U.S. Department of Homeland Security’s command centre monitors blogs, forums newsgroups and message boards on a daily basis. Scores of popular websites, including Twitter, Facebook, WikiLeaks, Hulu, and many alternative and left-leaning news sites also come under the umbrella of US surveillance.

Among the many examples that the Obama Administration has provided and which go above and the beyond the Neo-Conservative crimes of the Bush-Cheney cabal is President Obama’s regulatory Czar and legal scholar Cass Sunstein. Just before his appointment as Administrator of the White House Office of Information and Regulatory Affairs, this gentleman managed to add to the grand façade that is American democracy by writing a 30-page academic paper co-authored with Adrian Vermule entitled: “Conspiracy Theories.” In the paper he suggested the government should “infiltrate” social network websites, chat rooms and message boards. This “cognitive infiltration,” according to Sunstein, should be used to enforce a U.S. government ban on “conspiracy theorizing.” This ban would be imposed on such heresies as anti-anthropocentric global warming; the World Trade Centre attacks on 911 were an inside job; Al-Qaeda is a US government-created mercenary unit for hire and a range of other proven conspiracy facts, most of which feature on this blog. By “conspiracy theory” Sunstein defines it as “an effort to explain some event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

Heaven forbid we should try to expose that …

And of course, Sunstein implies that that there are no conspiracies operating in government, banking and corporate activities and if you are one of the mentally deranged few that believe so, then medical help and a good psychologist is the only path open to you. It seems everyone is a potential extremist if you are aren’t giving the government a virtual back-rub. He further suggests: ““… a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity.” [9]

Cass SunsteinCass Sunstein 2011, (AP Photo)

Sunstein’s objective is to raise: “… doubts about their factual premises, causal logic or implications for political action,” which places a whole new angle on some of many trolls and trouble-makers who periodically appear on website forums to sow seeds of discontent in ways which follow distinct patterns of emotional programming indicative of paid disinformation agents. Indeed, PSYOPS targeting the web have been in operation for several years, possibly since the internet’s inception in some form or another.  Sunstein’s suggestions are merely an updating of the US Dept. Defence’s Information Operations Road Map of the future. [10]

To make sure such a future – and the mass mind – is firmly where it should be DARPA means to keep biometrics and the internet connected to the same port (which, one day soon, may be located at the back of our skulls). Pentagon scientists are helpfully creating a program to use biometrics as a platform for creating a “cognitive fingerprint” which would dispense with all those passwords building up in our little black books. Which means, according to their website: “… validating any potential new biometrics with empirical tests to ensure they would be effective in large scale deployments.” Named the Active Authorisation Program (AAP) it offers deep analysis of the user’s cognitive processes and thus their online behaviour in the hope of inventing new forms of biometrics so that your identity can be ascertained.

Parallel to this grateful assistance in making our lives so much more efficient and safe, online tech journal Security Ledger reported in April 2013 on one time hacker and DARPA’s cyber chief Peiter “Mudge” Zatko heading to Google Inc. Joining Google’s Motorola Mobility’s Advanced Technology & Projects (ATAP) group, it has a mission to deliver “breakthrough innovations to the company’s product line on seemingly impossible short time-frames.” While Microsoft continues to track users of the Windows phones which have a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and really any of the big internet companies. Google knows the password of every Android device (phone or tablet) which has ever logged on to a particular Wi-Fi network. (Android accounts for 79 per cent of phones shipped worldwide).

Business Insider’s article of August 14th, 2013 alerted us to the fact that if you are one of 400 million persons who chose Gmail then you can also expect no privacy at all. In a class action complaint of 2013 Google responded by claiming “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” So, be warned, even though it is unlikely you’ll be able to avoid Google even if you wanted to.

It seems Google and DARPA are courting each other for good reason.

 


Notes

[1] Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say staying away from social media is ‘suspicious’ Daily Mail, 6 August 2012.
[2] ‘Facebook Is Building Shadow Profiles of Non-Users’ October 18 2011, http://www.slashdot.org
[3] “Facebook: About 83 million accounts are fake”. USA Today. August 3, 2012.
[4] ‘Top Ten Reasons You Should Quit Facebook’ by Dan Yoder http://www.gizmodo.com May 3 2010.
[5] ‘How 100 million Facebook users ended up in a list on BitTorrent’ Jemima Kiss, The Guardian, 29 July 2010.
[6] ‘With friends like these …’ by Tom Hodgkinson, The Guardian May 2010.
[7] Ibid.
[8] Ibid.
[9] ‘Conspiracy Theories’ by Cass R. Sunstein (Harvard Law School) and Adrian Vermeule (Harvard Law School) January 15, 2008, Harvard Public Law Working Paper No. 08-03, U of Chicago, Public Law Working Paper No. 199 U of Chicago Law & Economics, Olin Working Paper No. 387. [ During my own experience in working for several alternative news websites there was no question that persistent problems from site “trolls” on the relevant forums fell into this category. Some exhibited high knowledge on certain specialist subjects and exhibited a standard formula for contouring ideas and concepts which included the very same “cognitive infiltration” tactics cited by Sunstein and often in a highly elaborate form. Once “outed” they were gone but often the damage was already done].
[10] As part of the “Information Dominance” strategy of the Pentagon, ‘The Information Operation Road Map’ was a paper commissioned in 2003 and declassified in 2006. It was personally approved by the then Secretary of Defence Donald Rumsfeld. It included details of major PSYOPS disinformation campaigns to place false stories in newspapers and the internet as well as the kind of beginings of “cognitive infiltration” that Sunstein was so keen to see materialise.

Save

Technocracy X: Nano-Science (2)

 “We cannot rely on trial-and-error approaches to deal with existential risks… We need to vastly increase our investment in developing specific defensive technologies… We are at the critical stage today for biotechnology, and we will reach the stage where we need to directly implement defensive technologies for nanotechnology during the late teen years of this century… A self-replicating pathogen, whether biological or nanotechnology based, could destroy our civilization in a matter of days or weeks.”

― Ray Kurzweil, The Singularity is Near: When Humans Transcend Biology


dna_nano_tech-wideThe military is the largest investor in the U.S. Nanotechnology Initiative (NNI). The share of the NNI budget given to the Department of Defence (DoD) since the program started has reached $6.6 billion with part of the expenditure going to DARPA and the departmental laboratories of the Navy, Army and Air force, the rest ending up at universities as research grants or as part of the Multi-University Research Initiative (MURI).[1]  Though spending has been fluctuating since 2007, there remains steady interest in nanotech’s military capabilities. Scientists for Global Responsibility (SGR) revealed from their research that: “… government funding for military R&D dwarfs that spent on social and environmental programs across the industrialized world …” with military R&D fixed towards “… a narrow weapons-based security agenda.” [2]  Which means the marginalisation of conflict prevention and analysis of the roots of conflict and its links to poverty, the environment, security and health issues continue to be under-funded. Nanotech advances are being hijacked away from improving civilian life with “game-changing” technology as the culprit.

A fervent need to make these grand visions a reality was given a sturdy platform for realisation back in 2007 from the DoD and their little known advisory body called the Defence Science Board (DSB) whose paper entitled: “DSB 2006 Summer Study on 21st Century Strategic Technology Vectors” laid some important groundwork for the future. In an attempt to place nanotech at the top of the military agenda the paper drew their attention to “synergistic combinations” of all forms of nanotech and their “… truly revolutionary capabilities in human performance enhancement, medical treatment and prophylaxis, miniaturization, life extension, robotics, and machine intelligence …” [3]  It was unabashed in its agenda for clandestine tagging and tracking, where: “A combination of nanotechnology, biology, and chemistry promises to provide significant increases in capability to conduct pervasive surveillance on a global basis.”

spybee

prototype for cyborg-bee © unknown

Some of these other applications currently in R & D or primed and ready for action include the following:

Nano-biotechnology – or miniaturized biotechnology is the recent development of merging biology research with nanotechnology, most notably using biomolecules, bio-membranes and nano-photonics for vaccinations and virus research. Particularly active in medical fields the new science is seeking to generating cures; develop stem cell treatments, creating muscle tissue and artificial proteins. The convergence between computers and biology is of primary interest where eventually computing will be sourced from a biological platform where “Colonies of live neurons can live together on a biochip device.” [4]

Nano-electronics – The development of molecules with useful electronic properties which can then be used in nano-devices. This includes synthetic chemical methods and the creation of synthetic molecular motors. Other forms include carbon nano-tubes which have taken over from silicon-based chips. Now, the race is on to fit billions of these tubes onto computer chips thereby increasing the chip performance to “… run at more than three times the frequency and consuming just a third of the energy.” [5]

DNA nanotechnology – the construction of structures out of DNA and other nucleic acids. This branch has a special relationship to nano-medicine and “SMART drugs” for targeted drug delivery, the development and creation of vaccines and the adjacent field of nano-electronics with real world applications in both fields looming large. [6]

Nano-robotics/weaponryself-sufficient machines operating at the nano-scale. Applying nano-robots in medicine are proving difficult due to a multitude of problems adapting to the biology of organic systems, though progress is there. However, military nano-robotics in combination with cybernetics is moving ahead in leaps and bounds. There are still very little scholarly articles on the nature and pace of advances on military robotics along with only a sluggish attempt at raising the ethical and moral issues inherent in the use of such weaponry. What is clear is that the military is getting very excited by it all due to the unlimited scope of applications. Reduced to the size of perhaps 0.1mm or less, autonomous mini and micro-robots could be deployed on the ground, in water and in air, using the same propulsion principles found in larger electronic and mechanical systems. All forms of movement are mimicked such as human legs, various types of hopping, flapping wings like a bird, flagella, and even side-winding movements of a snake. The multi-purpose nature of robotics means that weapons systems targeting, reconnaissance, communication and surveillance are easily utilized. Insects and small mammals are already being integrated into bio-cyborg hybrids with nervous system and brain interfacing with cybernetics, software and electrodes.

cyborg-mothcyborg moth | © unknown

Returning to our whacky friends down at DARPA and their various sponsored companies and subsidiaries, we find they are still churning out helpful prototypes for new ways to spy, maim and murder. Some of these latest offerings are still prototypes, in the manufacturing stage or on the drawing board. They comprise:

1) Nano-Scouts – real insects and simulated bird-like technologies which act as the eyes and ears of intelligence. Flies and mosquitoes have embedded nanotech capabilities which allow them to determine the presence of certain chemicals, changes in moisture levels or barometric pressure, and be able to sense movements, temperature, and vibration.[7]

2) Nano-Poisons – A variety of toxic substances with nanomolecules carefully tailored to illicit the correct responses. By interfering with neuro-chemical inhibitors and release agents introducing precise “onboard” quantities of synthetic poisons behaviour modification is taken to a whole new level. Almost any type of mind control would be available from encouraging the victim to lie obsessively to provoking suicidal thoughts; stimulating a person to react violently or to kill. And of course, a Brave New World of somatic release could be programmed where the person cannot help but love everyone and where anger and aggression is blocked. Nano-molecules would effectively quadruple the effectiveness of purely psychological methods of mind control.

3) Nano Force Fields –nano-coatings which can hermetically seal a vehicle or building by allowing particles to seek out air gaps and block them.

4) Nano Mind Erasers – Want to take out a politician or spy without fuss or bother of assassination? Then, inducing the equivalent of instant Alzheimer’s is the answer. Wiping the sections of the brain clean using micro fields programmed to flare up as tiny, molecular neutron bombs would do the trick.

5) Nano Needles – With no visible wounds and invisible to the naked eye these weapons represent an up-dated version of the old KGB poison-tipped umbrella. The needles could be shot from a suitably modelled gun to paralyse people. Presumably the lethal nature of the needles would be dependent on their carrier capability.

6) Nano Heart-Stoppers – Nano-blood flow restrictors and Stroke Inducers – Long known to be a part of military-intelligence operations the assassination of sensitive targets such as politicians, heads of state and celebrities. Undetectable in the blood stream, nano-molecules could mimic heart attacks or strokes; restrict the blood flow causing an array of symptoms, even inducing personality disorders.

7) Nano-Naut Swarms These are ‘SMART dust’ particles which act as an information or sensor clouds capable of analysing areas with sharp detail and relying back information to HQ. As reported in the MSM in early February 2013, the British Army has been deploying tiny nano-drones in Afghanistan for over two years. At just 10cm long and weighing only 16 Grams they are used to relay full motion video and still images back to the devices’ handlers. But technology is advancing as fast as weapons can be bought.

8) Cyborg Insects – could be the delivery tool of much of the above allowing viruses and lethal substances to be to their individual or mass target, something that Bill Gates and his forays into mosquito-driven vaccines would no doubt happily welcome. Spying and surveillance capabilities have also been successfully tested and deployed. One of DARPA’s less malevolent offerings, the Nano Hummingbird was named One of Time Magazine’s 50 best inventions of 2011. Shaped like a humming-bird the mini robot is remotely-controlled without an external power source and can fly, hover, move forward and backward in the air while shooting Hi-Resolution video.

9) Programmable Matter – Starting in 2007, with DARPA support, Carnegie Mellon delved into the possibility of creating hardware and software to make material that can programmed to morph into 3-Dimensional shapes – essentially, shape-shifting. Named the Claytronics Project, the brains behind this venture believe that it has the capacity to change every facet of human experience. They consider claytronics to be a platform for a new form of called “Pario” with the reproduction of moving 3-D objects the primary goal. In other words, the quest to program the world around us. Just a few years later in 2010 with a “self-folding origami” robot which can literally fold itself up and crawl away. Meantime, shape-shifting sand made an appearance in 2012 where; “New algorithms enable heaps of ‘smart sand’ that can assume any shape, allowing spontaneous formation of new tools or duplication of broken mechanical parts.” This of course begins to the blur the whole fields of nanotechnology bioengineering, cybernetics, biological-based pharmaceuticals, programmable vaccines and the advance of synthetic biology.

The US Department of Defence is also researching the feasibility and applications of robotic mosquitoes. So far testing has found that they can be remotely controlled with an on-board camera and a microphone. They will be able to land on unsuspecting dissidents or terrorists with the potential to take a DNA sample or leave RFID tracking nanotechnology on your skin. Flying in through a crack in your window or attaching itself to your clothing in passing would prove no problem for these adorables. No doubt law enforcement and Homeland Security are salivating at such a prospect. [8] In fact, sightings of insect-like drones have been occurring for years in the US, most frequently at activist demonstrations and marches. According to a 2006 Flight International report: “… the CIA had been developing micro UAVs as far back as the 1970s and had a mock-up in its Langley headquarters since 2003.”

robot_insectAssuming such machines can fly onto a local protester’s arm and then wing its way back to its controller with a fresh little DNA sample to analyse, this compliments another disturbing scenario as described by authors Andrew Hessel, Marc Goodman, and Steven Kotler who “…outline futuristic human genome work that evolves from the very real GE $100 million breast cancer challenge.” In this scenario: “freelancers receive bids to design personalized virus offering customized cures for the sick.” An individual succumbs to colon cancer and instead of going the route of standard chemotherapy he chooses an immediate payment of $1000 to have his genome decoded over two days. Virologists of the near future will have information about the disease and the exclusive genome sequence. The design cure will be outsourced the winning bid providing the formula to rid your body of the specific cancer. Targeting the US President by criminal cartels or terrorist cells would be relatively easy.

A 2010 release of secret cables by WikiLeaks, Secretary of State Hillary Clinton ordered US embassies “… to surreptitiously collect DNA samples from foreign heads of state and senior United Nations officials.” [9]With that in mind, an article by Atlantic magazine takes the next logical step in personalised bio-weapons and micro-drones.

Picture an African President busy with civil war and child soldiers. Perhaps his DNA had been sampled as part of a UN / US mandate. A drug is tailored to that genome sent to an online bio-marketplace and synthesised into actual genetic material. The authors explain that it is here that “… the future of drones and virology could intersect.”

The article continues:

A few days later tablets are delivered to a group that dissolves them and injects the liquid into a handful of micro-drones. The team releases the drones and infects the people in the African leader’s circle of advisors or family. The infected come down with flu like symptoms, coughs and sneezes that release billions of harmless virus particles — but when they bring their symptoms in the vicinity of the African leader — the particles change. Once the virus particles are exposed to that very specific DNA sequence, a secondary function within their design unlocks.[10]

Perhaps the formula contained a “fast-acting neuro-destructive disease that produced memory loss and, eventually, death.” For the African leader or any other head of state which was proving an obstacle to US hegemony “the symptoms could be tailored an infinite number of ways. Designed to reflect a uniquely local affliction like Dengue Fever, or to appear like symptoms of a genetic condition.” [11]Combined with the inherent nature of the military-coporate-banking complex and with their puppet Obama who sees no problem with murdering American citizens via remote drone attacks discarding any notions of law and democratic due process, then you can be sure that such a scenario will take place in the very near future – if it hasn’t already.

The above scenario set against military nanotechnology and other forms of “non-lethal” warfare is justified due to the threat of terrorism and the belief that we can all bring an end to the world’s violence and crime. It is believed that technology will save the day on the battlefield and in civilian life. If left to these people it would rapidly start to resemble an endless battle in itself, which is the general idea. Convincing people not to act on their “evil” thoughts by allowing nano-dust particles to seep into their brains is bread and butter behaviour modification. For anyone else, it is a step towards a Huxleyian nightmare.

Although many commentators prefer to believe that the fail-safe mechanisms of quantum computing and the intelligence apparatus would be enough to protect mainstream society, they fall into the trap of believing that those of conscience are presently guiding humanity. Once again, you cannot use a juvenile dictionary to explain a psychopathic reality that is operating on an entirely different cognitive and perceptual mainframe.

The fractal nature of the nano-world of military applications means that advances in weaponry would take place exponentially with a modus operandi that would excite any social dominator beyond all measure. Using the premise of the molecular assembler, a device capable of breaking and creating the chemical bonds between atoms and molecules, it means duplication is not only feasible and efficient but a requirement once the technology is up and running. Think of the white Storm-trooper clones in the Star Wars films – very much military-technocratic ambrosia. As nanotech guru Eric Drexler explained: “a state that makes the assembler breakthrough could rapidly create a decisive military force – if not literally overnight, then at least with unprecedented speed.” He further observes: “A nation armed with molecular nanotechnology-based weapons would not require nuclear weapons to annihilate a civilization. In fact, it seems that a rather surgical system of seeking and destroying enemy human beings as cancerous polyps could be developed–leaving the nation’s infrastructure intact to be repopulated.” [12]

irobotStill from ‘I Robot’ (2004) Twentieth Century Fox

A research paper sponsored by the European Commission for a 2004 conference on the military uses of nanotechnology and the hazards to society at large, came to some sobering conclusions. While the benefits in medical and non-military domains was clear and should not be unduly hindered provided regulations and ethical boards were swiftly introduced, there were a number of indirect ways that society could be: “detrimentally affected” through the “diffusion of the technology.” The paper offered some examples, including the temptation for the National Security State and related agencies, corporations and criminals to purloin micro-sensors and robots for spying, as well as: “the use of small autonomous systems for criminal attacks – and in particular terrorism – including attacks on critical infrastructures.” They also included a third possibility, that of:

“… implanted systems and other forms of body manipulation for ‘improving human performance’. Deciding what kinds of body manipulation should be permitted, and under which circumstances is a problem of peacetime civilian life, and should be handled by civilian society. However, military R&D and deployment of such systems could establish a fait accompli before society is able to carry out a thorough debate on the desirability of particular technological developments.”

And there’s the problem.

The last thing psychologically compromised persons enjoying their place at the helm of Official Culture is to see the involvement of local communities and civic society. Genetically modified organisms and foodstuffs went this way as did television, banking, media, warfare and most other socio-political power structures which required either secrecy, perception management or corporate monopolisation to ensure a singular reality. Nanotech will be no different if it is allowed to continue without regulations and in the hands of those who wield power for their own ends. If we have humans behaving in psychopathic ways then it doesn’t require the greatest leap of imagination to realise that military robots will be a reflection of their state of mind and intentions. Pathocratic control systems require global dominance in all domains and nanotech represents a mighty leverage in the race to achieve it. Horizontal proliferation would be nearly unavoidable with small, self-replicating systems where in principle, a single copy would be sufficient for growth in another country or sub-state entity.

The report goes on to state:

Military robots with sizes from nanometres to metres would bring threats on an unknown scale. If they could kill, they could constitute new forms of weapons of mass destruction more potent than known biological warfare agents. With non-lethal effects, such as disruption of personality, mass attacks could lead indirectly to the breakdown of a society and the death of a large portion of its members. Partly as a result of their smallness, but mainly owing to their potential for self-replication and the production of additional weapons on site, nano-robots would create extreme uncertainty. [13]

Given the nature of nanotech, automated decision making would grow based on its tendency for a kind of peak, fractal replication to emerge, once technological thresholds have been reached and surpassed. When this level of technology fuses with the mentality of unlimited growth much like the standard economic mind set currently dominating, then a virtual arms-race at the molecular level could ensue with entirely unforeseen consequences. Military production overlaid with ideological insanity.

C60a

“Buckminsterfullerene C60, also known as the buckyball, is a representative member of the carbon structures known as fullerenes. Members of the fullerene family are a major subject of research falling under the nanotechnology umbrella.” (uploaded by Mstroeck at English Wikipedia Later versions by Bryn C at en.wikipedia)

Alongside the massive drive to foist genetically modified foods on global populations agribusiness is fascinated by the part nanotech can play in making food production and consolidation more efficient. However, using molecular assembly principles “nano scale carriers” will soon be used for delivering fertilizers, pesticides, herbicides and plant growth regulators. A case is being made to reduce environmental impact with nanotech. It is believed that this will improve stability and lessen environmental degradation in terms of chemical runoff and other related problems. An example of these carriers would be the use of clay nanotubes for pesticides which will apparently reduce the amount of pesticide use by 70–80 per cent. Nanoparticles can act to help mollify and transform resistant chemical compounds in to non-toxic ones while waste water treatment and disinfectants have the potential to be markedly improved. Fluorescent labelling by “quantum dots” (QDs) using bio-recognition molecules for anti-bacteria and disease control will be supplemented with an array of rapid detection and enzymatic biosensors. There is even a device called the “E-Nose” inspired by the human nose which, through the use of nanoparticle gas sensors can detect precisely the quality and quantity of gas present. [14]

Socio-economic demands will ensure that wireless nanosensors in crops designed to monitor and collate data on agronomic intelligence processes such as planting and harvesting cycles will become more and more important. Water levels, fertilizers, pesticides, herbicides and other treatments will also be under the nanosensor umbrella in the hope that maximization of crop yields and a reduction in resource input will be the end result. [15]

Biotechnology at the nanoscale is already having some success in the battle against plant resistance and environmental stresses such as drought, salinity and diseases. Nanobarcodes will be used for authentication and tracking in agricultural food and husbandry products. As knowledge grows in the area of plant gene traits and nanotechnology-based gene sequencing it is taken for granted that such process will offer new ways to reduce costs and maximize profits. [16]  With undoubted benefits that nanotechnology can provide, this is still inside the constraints of Official Culture. Farming has already been transformed into a leviathan of corporate efficiency where community, civic and independence has been sacrificed. Nano-farming may increase the overall efficiency and provide intermittent benefits, but will it have the capacity to transform agriculture away from agribusiness corporatism?

If new endeavours are dominated by the matrix of the 4Cs and the 3EM then it will limit the hope for social renewal and become just another tool to increase exploitation still bound by the same lowest common denominator. Consumerism, far from being modified or somehow reduced under this new technology will only intensify mechanisation, commodification and the encoding organic life, this time at the molecular level. Nanotechnology may have a place in improving humanity’s lot but not by being grafted onto a socio-political and economic framework that caused the problems in the first place.

Quite apart from providing new innovative tools for medical advances and the promise of an agricultural revolution, evidence so far in relation to health and environmental concerns doesn’t exactly promote confidence. Some of the latest research results show that:

  • Rats breathing in nanoparticles were found to exhibit inflammation, skin aging and stress responses.
  • DNA and chromosome damage which in turn “linked to all the big killers of man, namely cancer, heart disease, neurological disease and aging”.
  • Carbon nanotubes – the possible replacement for silicon – have shown to have the potential to cause mesothelioma ( a form of cancer).
  • Nanoparticles and nanofibres have shown to cause lung disease in a similar way to asbestos. [17]

Mark Wiesner Professor of Civil and Environmental Engineering at Duke University in Durham N.C., has argued for a rethink as to the way nanoparticles are selected and defined in relation to potential impacts on human health and the environment. His international team of researchers from the federally-funded Centre for the Environmental Implications of Nanotechnology (CEINT), based at Duke University in the United States, have raised a number of issues which need to be addressed if nanotechnology is to prove viable and ethically responsible. He believes there is presently confusion as to what truly constitutes a nanoparticle where “… materials often do not meet full definition of having special properties that make them different from conventional materials.” According to Wiesner, a key question that needs to be answered: “… is whether or not a particular nanoparticle has toxic or hazardous properties that are truly different from identical particles in their bulk form,” and this due to the fact that: “Many nanoparticles smaller than 30 nanometers undergo drastic changes in their crystalline structure that enhance how the atoms on their surface interact with the environment.”

The professor explains further:

“…because of the increased surface-area-to-volume ratio, nanoparticles can be highly reactive with other chemicals in the environment and can also disrupt certain activities within cells. … “While there have been reports of nanoparticle toxicity increasing as the size decreases, it is still uncertain whether this increase in reactivity is harmful to the environment or human safety,” Wiesner said. “To settle this issue, toxicological studies should contrast particles that exhibit novel size-dependant properties, particularly concerning their surface reactivity, and those particles that do not exhibit these properties.” [18]

Perhaps it is not the health and environmental issues which are really the problem. We humans are extraordinarily creative and ingenious. All the above is driven on the assumption of cybernetics and its systems theory as viable working models; the idea of “nested” organic systems and dissipative structures which are interrelated and interconnected by virtue of their functional similarity. *This means that bio-engineers and technocrats look at nanosystems as providing the potential for exponential growth via automatic and autonomous emergent properties. As described previously, this opens up a whole new pandora’s box when matter becomes programmable.

nanotubes_carbone

Carbon Nanotubes Source: tpe-nanotechnologie-cb.e-monsite.com/

According to nano scientists this follows that society and the human condition is about to “reshaped” in very positive ways: cleaning the environment, easing the pressure for natural resources, tackling hunger, curing AIDS and other invasive diseases; giving new life to paraplegics whilst enhancing the human body. However, will these laudable aims be set against a background of unresolved questions which threaten to undermine the human species? What has happened to new advances in technology in the past?

Nanotech advocates display frightening naïveté in this regard and an often ironic binary evaluation of what are highly complex issues, notwithstanding an ignorance of ponerology and psychologically compromised cultures. It is a contradiction to say that strengthening our democratic processes will somehow ensure responsible ethics which will insulate against the darker applications of nanotechnology when overwhelming expenditure is already focused in the hands of those who seek weapons advancement and shareholder profits. A barrier to accountability will remain as tenacious as it has proved to be in narcotics, conventional weapons and trafficking. It benefits the Establishment just as nanotechnology promises to do.

Futurist David Brin’s prescription to cultivate a “transparent society” where privacy is effectively non-existent is dangerous as it opens the backdoor for just about every totalitarian precept going. The self-replicating nature of molecular nanotech has given rise to end time scenarios where machines take over the world replacing humanity and organic life. Eric Drexler coined the term “grey-goo” otherwise known as ‘ecophagy’ to illustrate such a cybernetic apocalypse.[19]Think along the lines of “the Collective” from the Borg in the Star Trek TV series or the “Hive mind” so beloved of humanists and transhumanists. Expansion derives from assimilation and adaptive properties – “group think” in a futurist setting.

transmission-5speed-gears.ai

Corporations will be regulated insofar as it does not impinge on the market value of nanotechnology. This means regulations in medical and consumer arenas where it matters less will be followed. Where it is most needed however, is in domains such as weaponisation and agriculture and which will likely follow the traditional route of lobbyists and cartel economics – the path of least resistance. Meanwhile, legislation will have a very tough time keeping up with the rise of nanotechnology especially when environmental and privacy laws are only applicable to those adhering to the public domain and wholly irrelevant to government /corporate experimentation outside such accountability.

Although the military is driving nanotech advances (as with all things) the testing ground has begun with many “passive” or “first generation” commercial applications finding their way to the market place. As explored in the previous post the list is endless. If sunscreen products in the US contain nanoparticles and thus freely pass through the blood-brain barrier then the background of complex toxicology issues must remain at the forefront. In the same way, as GMOs, Wi-Fi and cell phones all have serious health questions hanging over them and health and environmental concerns of nanomaterials at this early stage have been completely ignored. Issues of privacy and confidentiality are also profoundly important.

The precautionary principle means that it is essential not to jump in feet first with this technology when there is an absence of suitable definitions regarding nanoparticle properties which could help scientists determine what represents a threat to the environment or human health. Despite certain advocacy groups calling for government regulation, the only principle which governs decisions is the one leading to the quickest possible profit. Nanotech forges ahead, in love with itself and its seemingly unlimited potential.

It doesn’t take a genius to see that it will go the same way as GMOs since the focus behind the drive to conquer nature, deny death and embrace immortality is exactly the same. Until regulation, insurance and extensive public discussion is forthcoming it is likely the more negative scenarios surrounding nanotech will play a greater role. After all, once the perceived genie is out of the bottle the consequences of its “magic” are more difficult to manage. This means that with all the wondrous potential for cleanng up the environment patents will arrive forcing us to pay for such ecological magic just as it was with the so-called “Green Revolution” of genetically modified crops. This means an expansion of selective wealth where transformation happens according to your pocket and status thereby replicating the same old divisions and class divides.

To reiterate the immovable direction of technology: it is the military and nano-weaponry which will determine the future of nanotech as a whole not whether a surgeon can provide life-saving operations or the disabled individual can begin to walk again. Altruism is not the primary currency of social exchange in a world shaped by psychopaths. Nanosystems will be nurtured on the same directive until such time we can wrest control.

 


* Dissipative Structure – A system that exits far from thermodynamic equilibrium thus dissipating the heat generated to sustain it. It has the capacity of changing to higher levels of orderliness leading to self-organization. These systems contain sub-systems that continuously fluctuate.


Notes

[1] ‘More soldiers in nanotechnology labs?’ By Michael Berger, nanowerk.com August 22, 2007.
[2] Ibid.
[3] http://www.acq.osd.mil/dsb/reports/2006-02-Summer_Study_Strategic_Tech_Vectors_Vol_I_Web.pdf
[4] NanoMedicine – A Review by K.K. Senthil Kumar, International Journal of Innovative Drug Discovery, Vol. 2 / Issue 1 / 2012 / 40-47 (from International Journal of Biopharmaceutics)
[5] ‘Carbon nanotubes fit by the thousands onto a chip’ By Jason Palmer, BBC News, 29 October 2012.
[6] DNA nanotechnology and transhumanism seem to fit snugly together in terms of their technological vision for humanity. Whether or not most persons working in the field are predisposed to this belief is irrelevant but the belief that vaccinations across the board are absolutely necessary and beyond reproach is a powerful part of the medical establishment. As such, the transhumanist paradigm naturally joins forces with materialism, atheism and corporatism to unfold their agenda accordingly. Journalist Sayer Ji has this to say on the subject:

“Not only have humans strayed from their mammalian roots by creating and promoting infant formula over breast milk, and then promoting synthetic immunity via vaccines over the natural immunity conferred through breastfeeding and sunlight exposure, for instance, but implicit within the dominant medical model is to replace natural immunity with a synthetic one. This is the philosophy of transhumanism, a movement which intends to improve upon and transcend our humanity, and has close affiliation with some aspects of eugenics.
The CDC’s immunization schedule reflects a callous lack of regard for the 3 billion years of evolution that brought us to our present, intact form, without elaborate technologies like vaccination — and likely only because we never had them at our disposal to inflict potentially catastrophic harm to ourselves. The CDC is largely responsible for generating the mass public perception that there is greater harm in not “prophylactically” injecting well over 100 distinct disease-promoting and immune-disruptive substances into the bodies of healthy children. They have been successful in instilling the concept into the masses that Nature failed in her design, and that medical and genetic technologies and interventions can be used to create a superior human being.
In this culture of vaccination, the non-vaccinated child is “inferior,” “dirty,” perhaps even “sub-human” to those who look upon vaccination as the answer to what perfects the human immune system.
Transhumanism participates in a dialectic which requires a simultaneous and systematic dehumanization of those who do not share the same way of thinking and behaving. The eugenic undertones of mass vaccination and the cult of synthetic immunity are now only thinly veiled, as we move closer to the point where a psuedo-scientific medical dictatorship lays claim to our very bodies, and the bodies of our children.
The point of no return (if not already traversed) is only around the corner: the mass introduction of DNA and Recombinant Vector Vaccine technology. Vaccines moved through the following stages (a tortured history of failures and massive “collateral damage”): Live Vaccines > Attenuated Vaccines > Subunit Vaccines > Toxid Vaccines > Conjugate Vaccines, only now reaching towards converting our living tissue into “vaccine-making factories” through the use of DNA and Recombinant Vector Vaccines, which are designed to directly alter cells within the vaccinated person’s body so that they create the antigens normally provided by vaccines themselves.
While not yet in use, clinical trials are now underway to obtain FDA approval. If we do not educate ourselves now and act accordingly, their mass implementation is inevitable, and our very genomes will become the next target of the vaccination/transhumanist agenda.” – ‘The Vaccination Agenda: Implicit Transhumanism’ By Sayer Ji, Contributing editor, Activist Post, January 24, 2012.
[7] Most Innovative Defense Technology’ 2008 Award Nominee – Nano SCOUT AeroVironment Inc.| http://www.defense-update.com/ | ‘The dragonfly built to spy – Tiny flying robots have the military abuzz, says Mark Harris’ http://www.timesonline.co.uk/tech.
[8] A COMBINED EXPERIMENTAL-NUMERICAL STUDY OF THE ROLE OF WING FLEXIBILITY IN INSECT FLIGHT Lingxiao Zheng, Xiaolin Wang, Afzal Khan, R. R. Vallance and Rajat Mittal1 Department of Mechanical & Aerospace Engineering, George Washington University, Washington DC 20052 Tyson L. Hedrick 2009. http://www.me.jhu.edu/fsag/Publications/Papers/AIAA-2009-382-170percent5B1percent5D.pdf
[9] ‘Hacking the President’s DNA’ November 12, The Atlantic Magazine, By Andrew Hessel, Marc Goodman and Steven Kotler.
[10] ‘Micro-Drones Combined With DNA Hacking Could Create A Very Scary Future’ By Robert Johnson, Oct. 28, 2012. Business Insider | http://www.businessinsider.com/
[11] Ibid.
[12] ‘A Glimpse Into China’s Post-Nuclear Super-Weapons: An Interview with Lev Navrozov on Nanoweapons by Ryan Mauro for http://www.worldthreats.com Sept. 26, 2003. | Quotes sourced from Engines of Creation By Eric Drexler (1986).
[13] ‘Military Uses of Nanotechnology – European Commission’ ec.europa.eu/research/conferences/2004/ntw/pdf/soa_en.pdf
[14] ‘How helpful is nanotechnology in agriculture?’ By Allah Ditta 2012 Adv. Nat. Sci: Nanosci. Nanotechnol. 3 033002 doi:10.1088/2043-6262/3/3/033002 Vietnam Academy of Science & Technology, 29 May 2012. IOP Science | http://iopscience.iop.org/2043-6262/3/3/033002/article#ansn431989bib05
[15] Ibid.
[16] ‘The potential and challenges of nanopore sequencing’ Nature Biotechnology 26, 1146 – 1153 (2008) Published online: 9 October 2008 | doi:10.1038/nbt.1495
[17] ‘Tiny Inhaled Particles Take Easy Route from Nose to Brain’ August 3, 2006, University of Rochester Medical Centre. | Wu, J; Liu, W; Xue, C; Zhou, S; Lan, F; Bi, L; Xu, H; Yang, X et al. (2009). ‘Toxicity and penetration of TiO2 nanoparticles in hairless mice and porcine skin after subchronic dermal exposure’. Toxicology letters 191 (1): 1–8. doi:10.1016/j.toxlet.2009.05.020. PMID 19501137. | Jonaitis, TS; Card, JW; Magnuson, B (2010). ‘Concerns regarding nano-sized titanium dioxide dermal penetration and toxicity study’. Toxicology letters 192 (2): 268–9. doi:10.1016/j.toxlet.2009.10.007. PMID 19836437. | Schneider, Andrew, ‘Amid Nanotech’s Dazzling Promise, Health Risks Grow’, March 24, 2010. | ‘ Nanofibres ‘may pose health risk’,’ BBC News, August 24, 2012. | ‘Is Chronic Inflammation the Key to Unlocking the Mysteries of Cancer?’ By Gary Stix, Scientific American, July 2007.
[18] ‘When Nano May Not Be Nano’ Duke University, Depart. Civil & Environmental Engineering September 14 2009.
[19] ‘Some Limits to Global Ecophagy by Biovorous Nanoreplicators, with Public Policy Recommendations’ By Robert A. Freitas Jr. April 2000. | www.rfreitas.com/Nano/Ecophagy.htm

Technocracy VII: DARPA’s Technophilia (1)

By M.K. Styllinski

 “Fifty years is ample time in which to change a world and its people almost beyond recognition. All that is required for the task are a sound knowledge of social engineering, a clear sight of the intended goal – and power.”

Arthur C. Clarke


In 1964 the director of the CIA Richard Helms who was overseeing much of the experiments in mind control came out with a statement in his memo to the US senate and the Warren Commission which said: “Cybernetics can be used in ‘moulding of a child’s character, the inculcation of knowledge and techniques, the amassing of experience, the establishment of social behavior patterns … all functions which can be summarized as control of the growth process of the individual.’”

Such a wish to mould the masses has not been relinquished.

The human enhancement – or “optimization,” as the military now like to call it – has been a trenchant fantasy for decades. Recall Hollywood movies such as The Terminator (1984) Robocop (1987) and Universal Soldier (2001) which explore the idea of a comic-book annihilator dispensing justice and vengeance against those who don’t have a taste for American culture. Making soldiers into a literal army of unquestioning, bio-genetic, pharmaceutically-enhanced killing machines has proved problematic to say the least. This is partly due to the fact that while huge numbers of soldiers are suffering from Post-Traumatic Stress Disorder (PTSD) and record numbers committing suicide on duty and during their return to civilian life, they understandably don’t fancy having their body transformed into a Captain America cyborg, even if their emotional body has been put through the shredder.

However, Pentagon financing keeps rolling in to the Defence Advanced Research Projects Area (DARPA) with national-security goals and the War on Terror acting as guidelines for military R&D and the convergence of nanotech. (Their website features competitions and public-friendly history lessons on how essential these types of innovations are to our human survival). Artificial systems including neuro-functional implants and ‘biological input/output devices’ will form the basis of a modified biochemistry to counter sleep deprivation, muscle fatigue, reaction time and endurance. This would be complemented by nano-medical monitoring of the soldier’s performance and the administering of therapeutic drugs and hormones according to programmed cycles of release. Other enhancements are possible. Electrodes might be connected to sensory organs, sensory nerves, motor nerves or muscles and appropriate brain-cortex areas. [1]Layered over the fleshly part of this “Terminator” would be a finely-tuned integrated system of equipment, body armour and uniform designed to achieve optimum levels of combat (and carnage) capability if required.

Indeed, in 2015 the DARPA boys have been using gene modifying optical technology to develop a ” ‘cortical modem’ which plugs directly into a person’s DNA and visual cortex.”  Thus, according to online journal CNET: Not only does this unique device help someone overcome blindness or poor eyesight, it generates a built-in heads-up display (HUD) that appears right in before their very eyes.  The implants create an augmented reality projection that appears like magic in your natural vision and without the need for helmets or special eyeglasses.” [2]

Undoubtedly, this new technology named optogenetics has positive implications for the blind and visually impaired. So too, it may prove an exciting prospect for virtual reality enthusiasts and computer gamers with an upgrade that would go beyond and integration of the virtual and material world never before experienced.

Mouse OptogeneticsMouse Optogenetics | Source: Guardian

Whenever there is a public and political reaction to transhumanist philosophy military or otherwise, the PR adapts and words change. Though $4 billion dollars has been syphoned away from cyborg soldier research to the SMART technology of unmanned drone warfare, R & D is still going on in the background. [3]The spiralling growth in military spending has long been out of control with over $152 billion going unaudited each year – and that’s not including CIA funded black operations under the radar of Congress. The outer layer of fraud, abuse and overtly criminal behaviour that’s going about its business behind such contracts is being missed by the Defence Department’s Inspector General. A 2008 report to Congress described: “undetected or inadequately investigated criminal activity and significant financial loss,” where: “personnel, facilities and assets are more vulnerable to terrorist activities.” [4]

Yeah and we know who the real terrorists are…

Part of the U.S. Department of Defence and created 50 years ago in response to the Soviets’ launch of Sputnik, DARPA are clearly dedicated to countering asymmetric warfare. They also acquire significant amounts of tax-payers cash to do it. The team are particularly excited to be re-designing our notions of what it means to be human, using the guinea-pigs of the US military as the model. Though no longer listed on DARPA’s website and only included those projects safe for public eyes, we can go back just a few years and read about all sorts of whacky “breakthroughs” such as the $4.5 million attempt to build a miniature, unmanned Osprey that can perch discreetly on trees, rooftops and flagpoles to spy on “foes” (or civilians, which is essentially the same thing.) $5 million was given to work laser-guided bullets able to turn at a 90 degree angle and “with a greater than 2km range.” Not forgetting the “cognitive swarm recognition technology” which is part of a program to spot rocket-propelled grenades before they are actually launched. Apparently this might involve a crossover project called “transparent displays” which exploits “… the optical plasmon phenomenology characteristics of nano-scale structures.” [5]

Perhaps the most disturbing aspect of DARPA’s modus operandi is the delving into the world of psychology and neurology in order to produce an invincible human fighting machine. Mind reading, cognitive enhancement, pharmaceutically-based mind control, and brain-machine interfaces all offer avenues of million dollar research contracts sourced from the same MKULTRA influences which have changed little over the past fifty years. Adaptation and synthesising of the hapless soldier’s brain is a primary target of research. As a 2003 Wireless News report stated: “Direct neural control of complex machines is a long-term U.S. military goal. DARPA has a brain-machine interface program aimed at creating next-generation wireless interfaces between neural systems and, initially, prosthetics and other biomedical devices.” [6]Or the $3 million funded Systems of Neuro-Morphic Adaptive Plastic Scalable Electronics, or SyNAPSE, a program that will: “… develop a brain inspired electronic ‘chip’ that mimics that function, size, and power consumption of a biological cortex,” … “If successful, the program will provide the foundations for functional machines to supplement humans in many of the most demanding situations faced by war fighters today.” [7]

The latest experiments have called for the next step in understanding the portion of the brain called the neo-cortex which is used for sensory and motor commands, spatial reasoning, language and those requiring conscious thought. In other words, higher brain functions. On September 19, 2013, Networld reported that DARPA is most interested in: “… new concepts and technologies for developing what it calls a ‘Cortical Processor’ based on Hierarchical Temporal Memory.”

In April of the same year, the Obama Administration announced a project called “Brain Research through Advancing Innovative Neurotechnologies” or the BRAIN Initiative which was funded by the 2014 budget. With DARPA lurking in the background and giving “support,” the initiative involves the collaboration of several science foundations and organisations. Dr. Francis Collins, the Director of the National Institutes of Health who shared his enthusiasm in a White House statement explained how: “… the BRAIN Initiative will focus largely on realizing new tools for imaging, recording, and eventually controlling neurons.” He said that project stresses the: “Great promise for developing such technologies” including: “… intersections of nano-science, imaging, engineering, informatics, and other rapidly emerging fields of science and engineering.” [8]

This research falls under the $3bn allocated by the Obama White House to develop technology identifying brain circuits, with financial assistance once again, from National Institute of Mental Health, who has: “… promised to move its seven-figure funding away from research into conditions such as schizophrenia and depression towards a system that looks at how brain networks contribute to difficulties that are shared across diagnoses.” The project is called Research Domain Criteria or the RDoCProject, rumoured to be an “… eventual replacement for the diagnostic system used by current-day psychiatrists.” The identification and modification of key brain circuits is the overwhelming interest in this field. [9]

KONICA MINOLTA DIGITAL CAMERA© infrakshun

There is no question that medical advances involving nanotechnology, neurology and neuropharmacology are destined to improve those suffering from disabilities and diseases ranging from blindness to multiple sclerosis and Alzheimer’s disease. In this context, the medical future is bright. Whether the desire to achieve a healthier and happier humanity will achieve pole position is a moot point at this stage. It is exactly the same mentality behind DARPA and the MKULTRA programs of mind experimentation of the 1940s-1970s which provides the majority of financial support and thus the continuation of that mind-set, with their attendant goals. The pace of change is awe-inspiring in the field of neuroscience and outsourced military applications spreading tentacle-like through Big Pharma, medical and educational institutions. Scientists have reached the point where computers can analyse MRI data from the brain and reconstruct thoughts, while others have broken new ground in making the first brain-to-brain interface. Rats were the primary focus followed by the human subjects using  Transcranial Magnetic Stimulation. [10]

Although almost all advances in neuroscience necessarily feed into the military-intelligence apparatus, the real action can be found in the marriage of cybernetics, biology and artificial intelligence. For instance, though it might seem like trying to count the flames in an inferno, one of the avenues of exploration currently occupying scientists is how to unlock memories stored in the brain in order to create a fully autonomous brain – housed in a robot.

In 2008, Kevin Warwick, a professor at the United Kingdom’s University of Reading explained in an Agence-France Presse report that the robot (named Gordon) has a brain which is: “… composed of 50,000 to 100,000 active neurons. Once removed from rat foetuses and disentangled from each other with an enzyme bath, the specialised nerve cells are laid out in a nutrient-rich medium across an eight-by-eight centimetre (five-by-five inch) array of 60 electrodes.”

The report continued:

“This ‘multi-electrode array’ (MEA) serves as the interface between living tissue and machine, with the brain sending electrical impulses to drive the wheels of the robots, and receiving impulses delivered by sensors reacting to the environment.

Because the brain is living tissue, it must be housed in a special temperature-controlled unit — it communicates with its ‘body’ via a Bluetooth radio link. The robot has no additional control from a human or computer. From the very start, the neurons get busy. ‘Within about 24 hours, they start sending out feelers to each other and making connections,’ said Warwick.

‘Within a week we get some spontaneous firings and brain-like activity’ similar to what happens in a normal rat — or human — brain, he added. [11]

Across the pond four years later, Brown University based in Rhode Island had created the first wireless, implanted, brain-computer interface. The wireless BCIs were implanted in pigs and monkeys for just over a year. The opportunities to test human subjects is imminent.  Not wishing to be outdone by their colleagues down the road, the University of Rochester Medical Centre in New York have carried out revolutionary work in the diagnosis and treatment of brain disorders. They hope their latest research will push new boundaries – ethical constraints notwithstanding. In the same year, scientists successfully grafted human glial cells into the brains of mice, thereby sharply enhancing their cognitive capacities. Improvements were seen across most brain operations such as memory, learning, and adaptive conditioning. The fact that scientists created human chimeric mice which is open to public scrutiny should give you some idea as to what is happening with those fully-funded projects which are conveniently away from public and judicial oversight. [12]

Just in case chimeric mice become passé then it will no doubt come as a relief to those whose bread and butter relies on such innovation that they can just grow their own brains in test tubes. At least, according to the Institute of Molecular Biotechnology in Vienna. On August 28, 2013 it was reported by the UK’s Independent about a beakthrough which saw scientists “grow a brain in a laboratory for the first time.” Affectionately named: “cerebral organoids” these miniature human brains were grown from skin cells in a laboratory and are no more than 4mm and: “… equivalent in development to the brain of a human foetus at about nine weeks’ gestation, and even have the complex three-dimensional structure of a real embryonic brain.” [13]  Brain resource issues may not be a problem for the Post Human.

DARPA has pooled its own resources to come up with yet another deterrent against the (largely non-existent) threat to the techno-military complex. The idea is to combine brain data from human sentry duty with machine-vision systems. Named logically as The Cognitive Technology Threat Warning System (CTTWS) it consists of: “… a wide-angle camera and radar which collects imagery for humans to review on a screen, and a wearable electroencephalogram device that measures the reviewer’s brain activity. This allows the system to detect unconscious recognition of changes in a scene—called a P300 event.” [14]

800px-Actroid-DER_01

“The Intelligent Robotics Lab, directed by Hiroshi Ishiguro at Osaka University, and Kokoro Co., Ltd. have demonstrated the Actroid at Expo 2005 in Aichi Prefecture, Japan and released the Telenoid R1 in 2010. In 2006, Kokoro Co. developed a new DER 2 android. The height of the human body part of DER2 is 165 cm. There are 47 mobile points. DER2 can not only change its expression but also move its hands and feet and twist its body. The ‘air servosystem'” (wikpedia)

Distinct from artificial intelligence systems which rely on standard computer programming, researchers have complemented cerebral organoids by constructing a tiny machine that “looks and thinks” like a human brain allowing robots to act independently. Substantial amounts of data from decades of studies into electrical activity in the brain, otherwise known as electroencephalography (EEG) played a vital part in advancing robotics to the next level. Teams based in various locations over America have managed to create robots which, according to James K. Gimzewski, professor of chemistry at the University of California: “… will be able to be able to learn and explore the terrain and work its way through the environment without human intervention.” Using the cybernetic and systems theory concepts of self-organisation this led the researchers to the creation of: “… nano-scale interconnected wires that perform billions of connections like a human brain, … capable of remembering information” thus processing data transcends current notions of computer capability. Gimzewski believes: “This could represent a revolutionary breakthrough in robotic systems.” [15]

DARPA’s continuing quest to find the perfect cyborg has resulted in the Darpa Robotics Challenge started in 2013. That challenge consists of developing software to bring to life a 330Ib cyborg named Atlas with a funding tag of $34m available to the winning team. According to The Guardian, copies of the Atlas Cyborg were given to teams that will: “… compete to win military prizes for designing the best software to bring Atlas to life. Already Atlas, and its predecessors, can rapidly climb stairs, do more push-ups than any human, and even pass for a person while donning a chemical protection suit.”

atlas

Atlas Robot developed by DARPA Source: http://makezine.com/

The Pentagon is as coy as can be about the future applications for a number of reasons, not least because they are a dangerous liability and ethically dubious. CIA drone attacks in Pakistan have killed up to 3,587 people since 2004, up to 884 of them civilians. Human Rights Watch has created a campaign to raise awareness about the rise of drone warfare based on the unethical premise of machines. According to the organisation robots will have: “… the power to make their own decisions about killing humans” which is not exactly a pleasant thing to consider. An international coalition has now formed which hopes to: “… call for a global treaty that would impose a ‘pre-emptive and comprehensive ban’ on artificially intelligent weapons before they are developed.” [16] This has led to the formation of the International Committee for Robot Arms Control (ICRAC).

As Obama’s drones are increasingly deployed in the skies over many American cities and happily carving up civilians with asymmetric glee, we can be sure that this is a revolution of sorts. Officials thought it prudent to throw an “official statement” to assuage the minds of those ready for such meaningless PR, and stated in Nov. 2012 Defence Department policy statement: “Autonomous and semi-autonomous weapon systems shall be designed to allow commanders and operators to exercise appropriate levels of human judgment over the use of force.” The document added further that: “complete engagements in a time-frame consistent with commander and operator intentions and, if unable to do so, [must] terminate engagements or seek additional human operator input before continuing the engagement.”


See also: “The Pentagon is building a ‘self-aware’ killer robot army fueled by social media” By Nafeez Ahmed


The above essentially means that the military will be permitted to do as they please with their new toys. If the machines don’t do as they are told then humans will take over to complete the missions. Exercising “judgment” seems to be the fail safe, which is even less reassuring considering the woeful legacy of the US military.

If you imagine getting machines to think like humans in a military setting is disturbing, medical discoveries will continue to surge ahead nonetheless, serving to buffer the disquiet forming in most minds – outside of DARPA, that is. Apparently, the excitement of the challenge is paramount, regardless of the consequences. The idea is to create machines which are as close to functioning humans as possible with the added bonus that they will kill on command. This will take us further down a road of mind control research in programmed assassins which characterised the post-World War II and Cold War machinations. This time, with the added dimension of cybernetic, bio-engineering. After all, developing cyborgs are much less expensive than fully automated robots and far more predictable than the fallibility of hypno-programmed humans. A blend of the two brings expendability to new levels.

What if the government could change people’s moral beliefs or stop political dissent through remote control of people’s brains? A leaked document reveals that the US government, through DARPA research, is very close to accomplishing this. (See The Manchurian Reality for the historical background)

A program using “Transcranial Magnetic Stimulation” (TMS) where the temporal lobe of the brain is stimulated with electromagnetic fields, continues the tradition. The objective in this particular example is: “… to remotely disrupt political dissent and extremism by employing in tandem with sophisticated propaganda based on this technology.” Such research is given the PR gloss that its focus is foreign war games when in fact, it is more likely to target a domestic populace as social and economic strife increases. According to phase 3 of the study paper entitled: entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects,” the ideal is to terminate lines of thinking in favour of thoughts they we would not normally be prepared to believe. In a military context we can assume that this is not about persuading people to see through Establishment deceptions – quite the opposite. [17]

Electro-stimulation and ultrasound technology have a long history in mind control experimentation upon which DARPA has eagerly capitalised. As part of its Faculty Award Program, the department kindly made a grant available to Dr. William J. Tyler, Assistant Professor in the School of Life Sciences at Arizona State University and co-founder and the CSO of SynSonix, Inc. With initial work supported by the U.S. Army Research, Development and Engineering Command (RDECOM) Army Research Laboratory (ARL). So, we know that medical uses are secondary here. After addressing the undoubtedly welcome potential for curing neurological diseases and brain injury, the professor informs us in a US Dept. of Defence article that: “… we have been working to develop methods for encoding sensory data onto the cortex using pulsed ultrasound.” He explains that a new technology has been developed: “… which implements trans-cranial pulsed ultrasound to remotely and directly stimulate brain circuits without requiring surgery. Further, we have shown this ultrasonic neuro-modulation approach confers a spatial resolution approximately five times greater than TMS and can exert its effects upon subcortical brain circuits deep within the brain.”

The upshot of this work and other research into brain circuitry is that it will be applied to US war-fighters where the professor states he will be putty in his benefactor’s hands looking forward: “… to developing a close working relationship with DARPA and other Department of Defense and U.S. Intelligence Communities to bring some of these applications to fruition over the coming years depending on the most pressing needs of our country’s defense industries.” [18]

I think we already know what those “pressing needs” are.

What is effectively a “Helmet of obedience” opens itself to a wide range of applications. Tyler is a busy worker bee. He has also created another plaything for military loons on his website MyBrainCloud.net which offers: “… a concept application of non-invasive brain stimulation using pulsed ultrasound, which is likely to emerge in the future. The concept is essentially to provide individual users with a personalized connection port through which various brain stimulation protocols can be administered in an open access manner using cloud computing. This technology has many broad applications ranging from at-home medicine to recreational applications such as interactive video gaming and virtual experience downloading.” [19]

The page has since been taken down.

HAARPHigh Frequency Active Auroral Research Program (HAARP)

At this point, we might usefully remind ourselves of the relatively modern use of High Frequency Active Auroral Research Program (HAARP).

Before it was apparently “closed down” it was based in Garkona, Alaska, and jointly funded by the U.S. Navy, the U.S. Air Force, the University of Alaska, and DARPA. HAARP was officially designated as an advanced weather research project focused on the ionosphere. It has been cloaked in mystery as to its true nature, in part due to an official stance of “national security” and the repellent legacy of US experimentation in the field of technotronic warfare and mind control. It seems part of the experimentation involved the use of electromagnetic frequencies and directed energy beams pulsed into the delicate upper layer of the atmosphere called the ionosphere around 1000 km above the Earth’s surface. The aim was/is to heat up specific areas which can create lenses of magnified effects. On the official website at http://www.haarp.alaska.edu/we can read: “HAARP is a scientific endeavor aimed at studying the properties and behavior of the ionosphere, with particular emphasis on being able to understand and use it to enhance communications and surveillance systems for both civilian and defense purposes.”

Though there is very little to go on regarding the nature, development and future direction of HAARP, Physicist Dr. Bernard Eastlund has given a lot of food for thought from his 1985 US patent entitled: “Method and apparatus for altering a region in the earth’s atmosphere, ionosphere, and/or magnetosphere” filed in 1985. If such a patent can be made available publicly you can be sure classified research is well in advance of similar prototypical research. From this patent, he states:

[The] temperature of the ionosphere has been raised by hundreds of degrees in these experiments.

A means and method is provided to cause interference with or even total disruption of communications over a very large portion of the earth. This invention could be employed to disrupt not only land based communications, both civilian and military, but also airborne communications and sea communications. This would have significant military implications.

It is possible … to take advantage of one or more such beams to carry out a communications network even though the rest of the world’s communications are disrupted.

[This invention] can be used to an advantage for positive communication and eavesdropping purposes.

Exceedingly large amounts of power can be very efficiently produced and transmitted.

This invention has a phenomenal variety of … potential future developments. Large regions of the atmosphere could be lifted to an unexpectedly high altitude so that missiles encounter unexpected and unplanned drag forces with resultant destruction or deflection. Weather modification is possible by, for example, altering upper atmosphere wind patterns or altering solar absorption patterns by constructing one or more plumes of atmospheric particles which will act as a lens or focusing device. Ozone, nitrogen, etc. concentrations in the atmosphere could be artificially increased.

Electromagnetic pulse defenses are also possible. The earth’s magnetic field could be decreased or disrupted at appropriate altitudes to modify or eliminate the magnetic field.

Though differing in scope and logistical capabilities this is exactly the type of experimentation which HAARP may still be carrying out, albeit under a entirely different set up.

Though many researchers posit HAARP was indeed a vast geo-engineering project linked to reducing climate change by saturating the atmosphere with specific chemicals – the infamous chemtrails controversy – it seems this was a sub-division of experimental research and a likely cover for something else. The evidence may surface that it is not restricted to weather but a continuation of experiments gained from mind control research, something which the Establishment has been interested in since the days of Nikola Tesla. The real action may stem from this long rumoured experimental mass mind control, in line with the US military’s goal of full-spectrum dominance by 2020.

Author and researcher Nick Begich Jr. and his influential book: Angels Don’t Play This HAARP, suggested that experiments in the ionosphere have advanced greatly to the extent that earthquakes, tsunamis and hurricanes can be triggered (Hurricane Katrina, 2005, Haitian earthquake of 2009) and localised as part of an on-going geostrategy. More importantly, he theorises that it is the product of decades of research which has resulted in a mind control device of considerable power.

Given that there has been decades of proven experiments in mind programming, huge advances in military technology such as Silent Sound Spectrum carried out by the US government, this is very far from outrageous. Begich’s claims and that of other researchers are supported by public patents relating to HAARP a sample of which follows:

  • C. W. Hansell (1945) “Communication system by pulses through the Earth”, U.S. Patent 2,389,432.;
  • R. L. Tanner (1965) “Extremely low-frequency antenna”, U.S. Patent 3,215,937;
  • G. F. Leydorf (1966) “Antenna near field coupling system”, U.S. Patent 3,278,937;
  • B. J. Eastlund (1987) “Method and apparatus for altering a region in the Earth’s atmosphere, ionosphere, and/or magnetosphere”, U.S. Patent 4,686,605;
  • B. J. Eastlund (1991) “Method for producing a shell of relativistic particles at an altitude above the earths surface”, U.S. Patent 5,038,664.

The history of DARPA’s main avenue of research has always been neuroscience, nanoscience and cybernetics adapted to military applications.  Though often designated as a classic conspiracy theory and therefore not worth investigating, it appears even the European Parliament expressed unease at the project in the document: “Minutes of 28/01/1999 – Final Edition, Environment, security and foreign affairs, A4-0005/1999: ‘Resolution on the environment, security and foreign policy’: stating that it: “… considers HAARP by virtue of its far-reaching impact on the environment to be a global concern and calls for its legal, ecological and ethical implications to be examined by an international independent body before any further research and testing.”

Good luck with that.

See also: Girl, 7, groomed online by ROBOT in shock case police can do nothing about


Notes

[1] op. cit. ‘Military Uses of Nanotechnology – European Commission’
[2]’DARPA implant could give people Terminator-like vision, coldorbit.com February 18, 2015
[3] ‘The Rise and Decline of Military Human Enhancement’ By Michael Burnham-Fink, Science Progress January 7, 2011. http://scienceprogress.org/2011/01/the-rise-and-decline-of-military-human-enhancement/
[4] ‘Pentagon Watchdogs Swamped by Military Spending; $152 Billion a Year  Goes Unaudited’ Wired May 2008.
[5] Ibid.
[6] ‘Toward a Brain-Internet Link,’ Rodney Brooks, WirelessNewsFactor, 10 December, 2003.
[7] ‘DARPA 2009: Brain On A Chip, Transparent Displays’ by Noah Shachtman, Wired February 2, 2008.

[8] ‘Obama has announced a $100-million brain mapping project’ io9.com, September 19, 2013.
[9] ‘Vaughan Bell: news from the borders of mental illness’ guardian/Observer September 29, 2013.
[10]’Computer can read letters directly from the brain’ Science Daily August 19, 2013.
[11] A ‘Frankenrobot’ with a biological brain, (AFP) Aug 13, 2008
[12] ‘First human brain-to-brain interface allows remote control over the internet, telepathy coming soon’, extremetech.com/ August 28, 2013
[13] ‘Scientists ‘grow’ a brain in a laboratory for the first time.’ by Steve Connor The Independent,August 28, 2013.
[14] ‘Sentry System Combines a Human Brain with Computer Vision’Lucas Laursen, MIT Tech Review, November 27, 2012.
[15] ‘DARPA Building Robots With ‘Real’ Brains’ http://www.nationaldefensemagazine.org 9 Apr 2013.
[15] ‘Rights group launches campaign to ban ‘killer robots” phys.org Apr 23, 2013 by Danny Kemp
[16] ‘Secret DARPA Mind Control Project Revealed: Leaked Document’ – Whistleblower Reveals Military Mind Control Project At Major University. Activist PostJuly 29 2013.
[17] ‘Remote Control of Brain Activity Using Ultrasound’ Armed with Science, http://www.science.dodlive.mil
[18] http://www.tylerlab.com/projects/ultrasound/future

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/

Puppets & Players VIII: Bilderberg Group

Bilderberg group connections (click on image to enlarge)
‘Imporre un governo pro Bilderberg destabilizzando le banche italiane’ (‘Imposition of pro Bilderberg government destabilizing Italian banks’) By Sandro Bulgarella


Arguably the most influential of the bunch, the Bilderberg group was founded in 1954 by handful of the usual suspects with directives from the Royal Institute of International Affairs (RIIA) (formerly Chatham House ) and the Round Table. These founding members included philosopher, economist, communist Poland’s Charge d’Affaires and European union architect Dr. Joseph H. Retinger, international banker Baron Victor Rothschild, industrialist Laurence Rockefeller, U.S. Ambassador to Moscow and CIA Director General Walter Bedell Smith, and the Netherland’s charismatic Prince Bernhard, husband of Queen Juliana of the Netherlands, the richest women in the world at the time. (This was primarily due to her business partnership with Victor Rothschild’s Royal Dutch Shell Oil Co. and substantial stock held in Exxon). [1]

Retinger-bernhard

(left) A Young Dr. Joseph H. Retinger; (right) Prince Bernhard

As you can see already, the Rothschilds were in on the act right from the start, once again since it is they who have the overall control over the direction and flow of money.

Though the name “Bilderberg” comes from the Dutch hotel that hosted the first meeting in Oosterbeek, Holland, the German-born Prince had far less innocent beginnings as a card-carrying Nazi and member of the SS. Though he redeemed himself in the minds of many by being a stalwart fighter in the Dutch resistance, it seems he was chosen for his mind-set. Bernhard and his Bilderberg baby is credited with being the cradle of the European Community the ultimate goal of which was – surprise, surprise – a one world government and an Anglo-American empire dominating the globe. [2]

Prince Bernhard was keen to work for British Intelligence during the Second World War and although initially refused he was offered work at the Allied war planning councils. This may have been a cover story. There is little doubt that America’s CIA had a large part to play in the formation of the Bilderberg meetings. In 1952, the agency allegedly financed a trip for Joseph Retinger to persuade Prince Bernhard to form regular, unofficial meetings which would provide a place to solve the problems of the Atlantic community. Dr. Retinger thrashed out the details with his old buddies David Rockefeller, (CFR)  Averill Harriman (Skull & Bones) and then director of the CIA Bedel Smith:

“… Retinger explained his proposal, Smith said, ‘Why the hell didn’t you come to me in the first place?’ He quickly referred Retinger to C. D. Jackson, who was about to become Eisenhower’s special assistant for psychological warfare. It took a while for Jackson to organize the American wing of the group, but finally, in May 1954, the first conference was held in the Hotel de Bilderberg, a secluded hotel in Holland, near the German border. Prince Bernhard, and Retinger drew up the list of invitees from the European countries, while Jackson controlled the American list.” [3]

As with most of the above groupings so far, a cross-fertilization of discussion takes place at regular meetings where geo-political policy is planned for the coming years. All the representatives from the usual spheres are present; the only difference being it has a distinctly European flavour, with an emphasis on Euro-banking. NATO representatives, “The Structural Adjustment Team,” of the IMF, World Bank and WTO, the Rothschilds and the Dutch Royal family’s Queen Beatrix are very regular members. Other attendees have included Bill Clinton, former UK Prime Minister Gordon Brown, Angela Merkel and the Goldman Sachs and Federal Reserve cartel as represented by Alan Greenspan, Ben Bernanke, Larry Summers and Tim Geithner. European Central Bank’s Jean-Claude Trichet, and Bank of England’s Mervyn King swap vol-au-vents with Lloyd Blankfein, George Soros, Donald Rumsfeld and Rupert Murdoch as just some of the luminaries who grace the Bilderberg meetings with their divine presence.

According Investigative journalist Daniel Estulin’s research, Steering Committee rules ensure that:

“… the invited guests must come alone; no wives, girlfriends, husbands or boyfriends. Personal assistants (meaning security, bodyguards, CIA or other secret service protectors) cannot attend the conference and must eat in a separate hall. The guests are explicitly forbidden from giving interviews to journalists or divulge anything that goes on in meetings.”

Estulin also states:

“Host governments provide overall security to keep away outsiders. One-third of attendees are political figures. The others are from industry, finance, academia, labor and communications. Meeting procedure is by Chatham House Rules letting attendees freely express their views in a relaxed atmosphere knowing nothing said will be quoted or revealed to the public. Meetings “are always frank, but do not always conclude with consensus.” [4]

There are numerous examples of Bilderberg influence greasing the wheels of progress for those they consider to be potentially useful in the achievement of their aims. Tony Blair was a Bilderberg attendee before becoming UK Prime Minister. Bill Clinton attended a meeting 1991 and made sure the North American Free Trade Agreement (NAFTA) took effect when he became President shortly after. NAFTA was a Bilderberg priority and Clinton, Establishment groomed, was considered a good choice to further their agenda. There are many others. Funding for the events is never a problem since several member organisations and companies willingly donate each year. Two of these regular contributors are Goldman Sacs and BP who financially assist the “charity” although since 2008 it has omitted the donator’s names from its accounts. [5]

Estulin is arguably the world’s expert on what is discussed at each year’s Bilderberg meetings. After 14 years of research based on what he calls “… the ‘conscientious objectors’ from inside, as well as outside the Group’s membership,” he has managed to garner a comprehensive picture of the perceptions and plans behind the Bilderberg Group and their aspirations for the world. The True Story of the Bilderberg Group shows convincingly that the suspicions of so-called “conspiracy theorists” are generally correct. Though some will find his breathless: “I’m-about-to bust-their-show-wide open-and-they’re-after-me” pitch a little too much to stomach the author has worked hard to prise open the inner workings of the group and should be commended for that, if not for the English text translations.

Estulin is convinced that the Bilderberg Group and its affiliated nodes are “a shadow world government” who are threatening to take away our right to direct our own destinies by creating “a disturbing reality” which is very far from the public interest. He writes: “Imagine a private club where presidents, prime ministers, international bankers and generals rub shoulders, where gracious royal chaperones ensure everyone gets along, and where the people running the wars, markets, and Europe (and America) say what they never dare say in public.” [6]

It seems at the very start of the Bilderberger project the idea was to build an “Aristocracy of purpose” between Europe and the United States in policy, economics, and strategy.” NATO was to ensure “perpetual war” and “nuclear blackmail” to keep the required fear quota at a premium and for geo-strategic bargaining chips. In David Rockefeller’s Memoirs (2002) he refers to both of these themes, stating: “Some even believe we are part of a secret cabal working against the best interests of the United States characterizing my family and me as ‘internationalists’ and conspiring with others around the world to build a more integrated global political and economic structure – one world, if you will. If that’s the charge, I stand guilty, and I am proud of it.” [7] You can’t fault Mr. Rockefeller for candour when it suits him. Yet, clearly, it much more than merely “a more integrated global political and economic structure” and “one world” as if you imply this is a fuss about nothing and quite natural and benign.

This rare glimpse of “honesty” doesn’t begin to address the institutional secrecy of which he is so “proud”. While these imperatives are set to continue to interfere in global decision-making it is because the Bilderbergers are very aware of both human psychology and the repercussions of the information Age that they will continue to work in secret. They know when information begins to leak progressively into the mass mind dots can be connected and a thinking population is the last thing they want.

In Estulin’s 2007 report – perhaps one of the most pertinent – he offers some possible trends on the energy scene and in particular oil, a resource that is deep interest to the Bilderbergers. He states: “From now on, the only sure thing is that supply will continue to diminish and prices will continue to increase. In these conditions world conflict is a physical certainty. End of oil means end of world’s financial system, something which has already been acknowledged by Wall Street Journal and the Financial Times, two full time members of the Bilderberger inner circle.”

membership-list-attendance-bilderberg-group-ottawa-20062

Bilderberg Group leaked attendee list, Ottawa 2009. (click on the image to enlarge)

Whether the “end of oil” is a realistic prediction any time soon, the accessibility of oil reserves is certainly a question which is being asked in the meetings with increasing frequency. Estulin continues: “Goldman Sachs oil report, (another full time member of the Bilderberger elite) published on March 30, 2005 increased the oil price range for the year 2005-6 from $55-$80 per barrel to $55-$105. During the 2006 meeting, Bilderbergers have confirmed that their short range price estimate for oil for the 2007-08 continues to hover around US $105-150/barrel. … No wonder Jose Barroso, President of the European Commission, announced several months ago during the unveiling of the new European energy policy that the time has come for a ‘post-industrial age.’”

Which brings us to the main thrust of Bilderberger designs:

To bring the world into the post-industrial age, you first need to destroy the world’s economic base and create another Great Depression. When people are poor, they don’t spend money, they don’t travel, and they don’t consume.” [8]

While the “end of oil” and by implication the concept of “Peak oil” may be another instrument from the propaganda tool-kit, the war for resources from water to mineral deposits, oil to foodstuffs will play a large role in the coming conflicts. The “Order out of Chaos” theme can be seen over and over where society is broken and rebuilt, only to be broken and rebuilt again according to how much and how many can be exploited. Whether it is the First or Second World Wars, the balkanization of Iraq, the creation of Kosovo as a narco-state – all have this strategy in common.

Supreme confidence in the Olympian ideals is drawn from the probable high incidence of psychopathy within their ranks. If we strip away the rationalisations and ideological nonsense all that remains is a framework by which they can exert unlimited power and control.

Estulin’s discoveries regarding their objectives are paraphrased thusly:

  • ““one international identity with one set of universal values;”
  • centralized management and direction of world populations by controlling world public opinion;
  • a New World Order with no middle class, only “rulers and servants (serfs),” and no democracy;
  • “a zero-growth society” without prosperity or progress, only greater wealth and power for the rulers;
  • The creation of “Union blocks” which will eventually be interlocked into one entity.
  • using the UN as a de facto world government imposing a UN tax on “world citizens;”
  • expanding NAFTA and WTO globally;
  • the world militarization of NATO;
  • imposing a universal legal system; and manufactured crises and perpetual wars;
  • absolute control of education to program the public mind and train those chosen for various roles;
  • “centralized control of all foreign and domestic policies;” one size fits all globally;
  • A global “welfare state where obedient slaves will be rewarded and non-conformists targeted for extermination.”

What is more, the vast influence that is brought to bear on global power-brokers and their goals is entirely illegal. Under United States law, the Logan Act states that it is against the law for federal officials to attend secret meetings with private citizens in order to develop public policies. (The same principle applies in the UK). Therefore, when US officials have attended Bilderberg meetings, they were breaking federal laws of the United States. As online journalist Jerry mazza reminds us at the 2005 Bilderberg meeting : “… the American government was well represented in Rottach-Egern by Alan Hubbard, assistant to the president for economic policy and director of the National Economic Council; William Luti, Deputy Under Secretary of Defence; James Wolfensohn, outgoing president of the World Bank and Paul Wolfowitz, deputy secretary of state, an ideologue of the Iraq War and incoming president of the World Bank.” [9]

070513groveBilderberg 2013 Conference took place at the Grove Hotel, Watford, UK

The corporate media still refuses to cover the Bilderberg meetings except for the occasional piece by more independent journalists such as the Guardian’s Charlie Skelton. Generally, the meetings remain unknown by the majority. Like the CFR’s total control over the American media CNN, CBS, ABC and other media giants continue to control and filter everything that passes as news to the general public. Many Bilderberg attendees are journalists and newspaper editors who push the required propaganda while agreeing to keep silent about the groups meetings.

The closely aligned Rockefeller family has managed to rapidly exert incredible power over socio-cultural, economic and political discourse in both the US and the UK. It is worthwhile reminding ourselves once again of another example of David Rockefeller’s soul-bearing in this context where he expresses his gratitude to: “… the Washington Post, the New York Times, Time and other great publications whose directors have attended our meetings and respected their promises of discretion for almost 40 years.” And here we have the truth laid bare, when he states: …It would have been impossible for us to develop our plan for the world if we had been subjected to the lights of publicity during those years. But, the world is more sophisticated now and prepared to march towards a world government. The supranational sovereignty of an intellectual elite and world bankers is surely preferable to the national auto determination practiced in past centuries.” [10]  It is the self-proclaimed status as demi-God that characterizes the present breed of psychopaths convinced of their own special “auto-determination” outside the destiny of normal peoples. Bilderbergers, Trilateralists and CFR members want an all-encompassing and preferably eternal monopoly over every aspect of our lives – that is the endgame.

The UN is busy doing its level best to provide them with that mechanism under a document called “Geneva Centre for the Democratic Control of Armed Forces (DCAF)” policy paper No. 24. This may as well have been written by the hand of Rockefeller himself for in this little-known paper we can read how “Governance solutions for reasserting the state monopoly on the use of force” and a helpful, altruistic listing of the options available to governments to re-establish “monopolies of force” against their own people:

  • (Re-) establish state monopoly – Ownership of WMDs – Safety Inspectorates
  • Prohibit business activity – Justice and Execution – Deadly Force?
  • Regulate/limit activities – Private defence/security services, Control of financial transfers – Export controls – Transport and infrastructure safety – Environmental impact

What is more: “The legitimate monopoly of force should not be limited to the nation-state but should be based on the local, national, regional and the global levels.” And further: “At the global level no monopoly of violence exists. The UN Security Council already has a monopoly power to authorize the use of force at the global level, although the UN was never given the necessary means to exercise this authority, such as the capacity to implement sanctions, a police force and armed forces… This deficiency in global governance acts as a bottleneck and a barrier to the creation of the democratically legitimized monopoly of violence that is globally required.” [11]

Pathocrats

See also: The Dark Green series exploring “Eco-Fascism” and “Eco-Intelpro”.


Notes

[1] Queen Juliana: The Story Of The Richest Woman In The World, by William Hoffman, Published by Angus and Robertson, 1980 | ASIN: B000UI94JK.
[2] See: H. R. H. Prince Bernhard of the Netherlands: an authorized biography by Alden Hatch. Published by Harrap, 1962.
[3] The Chairman: John J. McCloy – The Making of the American Establishment, by Kai Bird, Published by Simon & Schuster, 1992.
[4] op. cit. Estulin (p.25)
[5] Applications listed in the Charity Commission annual records: http://www.apps.charitycommission.gov.uk/Accounts/Ends06/0000272706_AC_20080331_E_C.PDF
[6] Ibid.
[7] Memoirs By David Rockefeller, Published by Random House, 1st Trade Ed edition, 2002. ISBN-10: 0679405887 (p. 490).
[8] ‘Bilderberg 2007: Welcome to the Lunatic Fringe’, by Daniel Estulin DanielEstulin.com, May 21, 2007.
[9] ‘I’ll have the Bilderberger, well done!’, by Jerry Mazza Online Journal, Nov 9, 2007.
[10] Quoted from Bilderberg/Trilateral meeting in 1991 in Baden Baden, Germany. (See Daniel Estulin.)
[11] Geneva Centre for the Democratic Control of Armed Forces (DCAF) Occasional Paper – № 24 ‘The Privatisation of Security in Failing States – A Quantitative Assessment’ By Željko Branović, Geneva, April 2011.

 

Puppets & Players VI: Council on Foreign Relations

 “The near monopoly of power once enjoyed by sovereign entities is being eroded … states must be prepared to cede some sovereignty to world bodies … Globalization thus implies that sovereignty is not only becoming weaker in reality, but that it needs to become weaker … The goal should be to redefine sovereignty for the era of globalization, to find a balance between a world of fully sovereign states and an international system of either world government or anarchy.”

– Richard Haas CFR President February 12 2006.


infinite-cash.comProfessor Carroll Quigley described in Tragedy and Hope the Council on Foreign Relations (CFR) as “… the American Branch of a society which originated in England [and] believes national boundaries should be obliterated and one-world rule established.” [1]The founding members of CFR were some of the same members involved in the creation of the Federal Reserve System in 1913 and the Round Table movement of Cecil Rhodes and Lord Alfred Milner. Many members were drawn from the emerging Military-Industrial complex, incorporating the fresh young blood of the intelligence apparatus of the US government. The CIA’s Allen Dulles and John Foster Dulles had both been at the Paris Peace conference along with so many other world government enthusiasts and were founding members of the CFR. Allen Dulles became a member of CFR in 1926 and later its president. His brother John Foster, an in-law of the Rockefellers, Chairman of the Board of the Rockefeller Foundation, and Board Chairman of the Carnegie Endowment for International Peace was well placed for CFR steerage by the time he was Secretary of State under President Eisenhower. From a 1993 Annual report: “The Council on Foreign Relations is a non-profit, and nonpartisan membership organization dedicated to improving the understanding of US foreign policy, and international affairs through the exchange of ideas.”

This is vague enough to encompass almost any ideological and political persuasion while giving the impression of unsullied innocence. True to its Round Table origins its actual objectives are to forge a centralised system of global government based on an inter-locking financial and corporate architecture policed by a world Army. As Senator Earnest Hollings of South Carolina bluntly put it for the Congressional Record, June 30, of the same year: “If you ever run for President, you get very wonderful, embossed invitations from the Council on Foreign Relations and the Trilateral Commission, and you get the coffee and fine china, and, man, you are really a high muckety-muck. And then what they do is get you to swear on the altar of free trade an undying loyalty and support—free trade, free trade. That is all they want. And they co-opt every one of these young Senators that want to run for President.” [2]

Today, CFR membership is made up of presidents past and present, Secretaries of State, Wall Street investors, Joint Chiefs of Staff, international bankers, executives, ambassadors, think-tank executives, lobbyists, lawyers, NATO officiandos, Pentagon military leaders, Establishment press, media owners, academics, novelists, entertainers, university presidents, senators, and Congressmen, Supreme Court Justices, Federal Judges, and rich businessmen of every creed and colour. An ex-CFR member who seemed to wake up to the reality of what the organisation was promoting was former Judge Advocate General of the U.S. Navy, Retired Navy Admiral Chester Ward who wrote a scathing critique of CFR stating that their objective is the: “… submergence of U. S. sovereignty and national independence into an all-powerful one-world government…” [3]

The overriding principles of a world government that would be based on the Chinese template of communist world state or world government and capitalist economy is still the dream of the CFR globalists as it was with J.D. Rockefeller. In 1962 a study titled, A World Effectively Controlled by the United Nations, CFR member Lincoln Bloomfield states: “… if the communist dynamic was greatly abated, the West might lose whatever incentive it has for world government.” And of course, in order to achieve world government and its interlocking “unions” it is necessary to dispense with the idea of sovereignty, economic or otherwise. The CFR members espouse just such a directive for their brand of globalisation.In April 1974, former U. S. Deputy Assistant Secretary of State, Trilateralist and CFR member Richard Gardner published an article in the CFR’s Foreign Affairs entitled: ‘The Hard Road to World Order’ in which he declared: “… the ‘house of world order’ will have to be built from the bottom up rather than from the top down … but an end run around national sovereignty, eroding it piece by piece, will accomplish much more than the old-fashioned frontal assault.”

cfr

Screen shots from the film clip: Council on Foreign Relations

cfr2

The usual suspects crop up again and again …

Since the creation of the Office of Secretary of Defence in 1947, 14 DoD secretaries have been CFR members. Since 1940, every Secretary of State, except James Byrnes, has been a CFR member and/or a member of the Trilateral Commission. Equally, for the past 80 years, almost every key US National Security and Foreign Policy Advisor has been a member. The majority of top generals and admirals and many former presidential candidates were/are CFR, including Herbert Hoover, Adlai Stevenson, Dwight Eisenhower, John F. Kennedy, Richard Nixon, Gerald Ford, Jimmy Carter (and TC member), George HW Bush, Bill Clinton, John Kerry, and John McCain.

CIA directors were/are CFR, including Richard Helms, James Schlesinger, William Casey, William Webster, Robert Gates, James Woolsey, John Deutsch, George Tenet, Porter Goss, Michael Hayden, and Leon Panetta. Many Treasury Secretaries were/are also in the Club such as Douglas Dillon, George Schultz, William Simon, James Baker, Nicholas Brady, Lloyd Bentsen, Robert Rubin, Henry Paulson, and Tim Geithner. [4]

Virtually everyone who has held a position at the US administrative level in the US has been a member of the CFR. Some past and present members include: David Rockefeller, Thomas Foley, Jeane Kirkpatrick, Paul A. Volcker, Prince Edward, Prince Charles of Wales, Madeleine K. Albright, Robert S. McNamara, Zbigniew Brzezinski, George H.W. Bush, Donald E. Graham, Henry A. Kissinger, Richard N. Perle, George Soros, Lawrence H. Summers, John D. Rockefeller IV. Bankers, Alan Greenspan, and World Bank President Robert Zoellick. Secretaries of State Henry Kissinger, Condoleezza Rice, Hillary Clinton. MSM CFR includes Katie Couric, Bill Moyers, Diane Sawyer, Tom Brokaw as well as foreign heads of state Mikhail Gorbachev, Benyamin Netanyahu and Robert Mugabe of Zimbabwe and even the Dalai Lama. Corporate membership spans most of the Fortune 500 companies such as BP, Citigroup, Goldman Sachs, Google, Merck, NASDAQ, Pfizer and VISA.

One only has to take a look at the Council on Foreign Relations website to see that it has developed a sophisticated propaganda machine. Simply read the associated blogs and you’ll get an immediate flavour of what their objectives are all about. Unlike Le Cercle or Skull & Bones and occult groupings, this is indeed an open conspiracy. They are happy to court those in the entertainment business who usually have a very superficial understanding of Anglo-American designs but nevertheless due to their mass appeal and willingness to feed their egos and perceived social conscience, promote highly simplistic “solutions” while admirably serving the hidden interests of their backers.Actors such as George Clooney and Angelina Jolie are a case in point, the latter having become a satisfied CFR member last year and is busy doing her best to promote the organisation’s principles. She has very broad social appeal and represents quite a coup for the media focused think-tank.

To that end, social engineering and “information dominance” through the world’s media is essential part of CFR operations and has always played a major part in the shaping the minds of both old and new members so they may in turn, mould the public mind. As Quigley mentions: “The American branch of this ‘English Establishment’ exerted much of its influence through five American newspapers (The New York Times, New York Herald Tribune, Christian Science Monitor, the Washington Post, and the lamented Boston Evening News).” The RAND Corporation is most closely associated with the group and its expertise in PSYOPS is routinely used by a various members of the American Establishment and their promotional arms; from the internet to carefully stage-managed media press conferences. [5]

Most importantly for the CFR and other groups, the decision to infiltrate the left-wing and liberal leaning political movements as far back as 1917 by Round Table and J.P Morgan agents proved hugely important as the MSM evolved. Wall St. was a vital component in the placing of editors and staff amenable to their vision. A Congressional record verifies this fact from statements made by Congressman Oscar Callaway who stated: “… the J.P. Morgan [banking] interests …. and their subsidiary organizations got together 12 men high up in the newspaper world and employed them to select the most influential newspapers in the United States and sufficient number of them to control generally the policy of the daily press of the US … They found it was only necessary to purchase the control of 25 of the greatest papers. … an editor was furnished for each paper to properly supervise and edit information …” [6] Quigley observes that the“… purpose was not to destroy … or take over but was really threefold:

(1) to keep informed about the thinking of Left-wing or liberal groups;

(2) to provide them with a mouthpiece so that they could “blow off steam,” and

(3) to have a final veto on their publicity and possibly on their actions, if they ever went “radical.” [7]

Sociologist Hadley Cantril wrote in his 1967 book The Human Dimension – Experiences in Policy Research: “Psycho-political operations are propaganda campaigns designed to create perpetual tension and to manipulate different groups of people to accept the particular climate of opinion the CFR seeks to achieve in the world.” They have been supremely successful in doing just that. Their policy of non-attribution where nothing that is said in public contradicts their message of openness and transparency as does their numerous secret meetings not open to the public. Twenty years ago, the CFR was relatively unknown. Now, with the information age, there is much greater awareness, which is why its slick media campaigns are highly sophisticated in order to match the changing times.

See also: Behind the Big News: Propaganda and the CFR  and The Mainstream Media (MSM)

 


Notes

[1] pp.951-952; Quigley, Carroll, Tragedy and Hope (1966)
[2] Senator Earnest Hollings (D) of South Carolina, Congressional Record, June 30, 1993, S8315.
[3] CFR Annual Report 1993-1994.
[4] The True Story of the Bilderberg Group By Daniel Estulin. Published by Trine Day, 2nd edition 2009. | ISBN-10: 0979988624.
[5] op. cit. Quigley The Anglo-American Establishment (1981).
[6] Congressman Oscar Callaway statements were included in the Congressional Record, vol. 54, February 9, 1917, p. 2947.
[7] op. cit. Quigley (1966)

Puppets & Players III: Le Cercle

cercle 1

© infrakshun


In June 1997, The Independent ran one of the very few reports about Le Cercle stating that it was: “One of the most influential, secretive, and it goes without saying, exclusive political clubs in the West … One member contacted by this newspaper said he could not talk about it ‘even off, off the record’. Another simply put the phone down … The source of its funding is a mystery…” [1] Joël van der Reijden has extended the research on Le Cercle with his well sourced 2006 article, some of which will form the following information. [2] Readers are encouraged to embark on their own investigations in order to shine more light on one of the most secretive Western-oriented organisations within the Three Establishment Model (3EM).

Previously known as the ‘Pinay Circle’ or the ‘Cercle Pinay’, Le Cercle (The Circle) is a trans-national think-tank, discussion group and strategic board for politicians, bankers, media chiefs, corporate executives police, military and intelligence agents. Its beliefs stem from allegiance to the British aristocracy and the Vatican wrapped up with fascistic European Synarchy. It is fanatically anti-communist seeing a KGB conspiracy behind every international event. It is through this group that the Vatican Pan Europa Network functions with members from Opus Dei and the Knights of Malta on board, headed by Otto von Habsburg as representative until 2011. Since it came to the attention of researchers, largely thanks to van der Reijden, it has remained highly secretive and unknown to the public.

Merging with the Synarchists’ desire for an integrated European State, the whacky intent of the Vatican sect is to see its own brand of New World Order in the form of an Imperium Romanum Sacrum or New Holy Roman Empire. The British Synarchists are now less interested in joining the EU in comparison to the past now that the possibility of leading the EU Superstate is unlikely thanks to the rise of the Franco-German Alliance. It is here that American members are keen to exert influence and join forces. And since the break-up of the Euro is now an inevitability (it was never meant to be a long-term currency) the project that was the European Union is coming to and end, in the hope that a different form of union can emerge from the coming ashes…

Le Cercle, as they name implies, has its origins in France as the brainchild of Jean Violet, who formed the group in 1951. Violet was a known Nazi collaborator and a member of Comité Secret pour l’Action Revolutionnaire (CSAR), a fascist secret society with occult overtones. It was said by some to have been part of the Synarchist movement seeking to undermine the French Republic in preparation for the Nazi invasion. [3] It was after the war that Violet came into contact with Antoine Pinay who was in bed with Opus Dei and French Intelligence (SDECE). This was the start of Violet’s wide-ranging network which extended from senior Opus Dei officials and Vatican intelligence to the European Centre of Documentation and Information (CEDI) which was part of the Pan Europa Union set up in 1923 by Count Richard Coudenhove-Kalergi, son of an Austro-Hungarian diplomat and quickly patronized by the Habsburgs, the Vatican, and eventually Opus Dei to become the right wing Vatican Pan Europa network. The Pan Europa Union’s objectives were to keep the Soviets out of Europe, and to create a Roman Catholic-oriented European Superstate. Violet’s connections even got the attention of the Head of German intelligence and former Nazi General Reinhard Gehlen who recruited him due to his networking capital within Le Cercle. [4]

Throughout the 1950’s and early 60’s Pinay and Violet set about recruiting Franco-German members to implement the vision of a United European State. This was after all, a key strategy of the Nazi Third Reich should Germany lose the war for Germany to dominate Europe economically if not ideologically. [5]  Two of these early members were Robert Schuman French prime minister from 1947 to 1948 and French foreign minister from 1948 to 1953 and Jean Monnet, Planning Commissioner of the National Economic Council from 1945 to 1952. Both were connected to top level economic and political circles in North America, the UK, and Western Europe. Monnet was particularly strong in pushing for an integrated Europe in the aftermath of WWII. He was to become the architect and visionary of the kind of Europe le Cercle members wished to see, by forging high-level links within the Anglo-American Establishment and British aristocracy and overseeing organization of the Pilgrim’s Society. Anyone who was anyone knew Monnet and who was one of the primary Elite intermediaries of the 1930s 40s and 50s. Early members included Lord Kindersley of the Bank of England; Arthur Salter a European Federalist and one of the core leaders of the Round Table; US Secretary of State John Foster Dulles; Lady Nancy Astor and the Earl of Perth, Sir Eric Drummond. [6]

The Venetian Black nobility line found it’s connection to Le Cercle via Bilderberg co-founder and Vatican agent Joseph Retinger when Monnet organized the May 1948 Congress of Europe, a project of the United Europe Movement in The Hague. CIA heads Allen Dulles and Bill Donovan were present marking the beginning of a financial support system the United European Movement in the following decades.

According to Joël van der Reijden, Le Cercle member Robert Schuman:

“… proposed the so called ‘Schuman Plan’, which became the basis for the European Coal and Steel Community (ECSC). It was established in 1952 and is usually seen as the birth of the European Union. In reality, Monnet, who became the first chairman of the ECSC’s High Authority, had entirely written the ‘Schuman Plan’. And interestingly, even this might only partially be true, as Monnet’s structure for Europe turned out to be a slightly adapted version of Arthur Salter’s 1931 paper ‘The United States of Europe’, which originally advocated a federal Europe within the framework of the League of Nations. Both men worked high up in the League of Nations and had a close relationship to the leading Anglo-American families….” [7]

With Monnet’s repeated attempts to create a European Defence Community (EDC) failing to materialize he founded the very low-profile Action Committee for the United States of Europe (ACUSE) with a view to pushing forward the integration of European nations. This would later be part of the immense lobbying efforts for the creation of the European Economic Community (EEC) as well as the 1957 Treaty of Rome which would inspire many other EU integrationist organizations and bodies. The Pilgrims Society, Bilderberg Grp; the Rockefeller family and members of future Council on Foreign Relations and Trilateral Commission organisations were crawling all over the European initiatives.

By 1961, Monnet’s formidable networking oversaw the creation of the Organization for Economic Cooperation and Development (OECD) which has since become the European contribution to the World State vision and linking the globalization imperatives of the Structural Adjustment Team of the IMF, WTO and the World Bank. Monnet as Le Cercle representative wasn’t finished however. On a synarchist roll, talks with which UK Prime Minister Edward Heath followed along with the entry of Britain into the European Common Market thanks to input from Vatican mover David Drummond who oiled the wheels of Heath’s awareness. Entry of the European Economic Community was a foregone conclusion by 1973.

Jean Monnet also exerted pressure and influence in creating and strengthening Franco-German alliances so that it would hopefully, under synarchist leverage, have the final say in the destiny of European integration and the long-hoped for European block. It was however, because of De Gaulle’s realization that the Anglo-American Establishment and the synarchists of the time were not in line with a more autonomous and agriculturally independent states within Europe that he became a target for those pushing for a Federal Europe. De Gaulle wasn’t just being nationalistic here. He was a keen elder statesman and knew what forces were at work behind the scenes.

Citing a need to maintain an independent military strategy, De Gaulle Withdrew from NATO, expelled Allied forces from France and attempted to establish better ties with Communist Russia all of which was on top of his decision to withdraw from Algeria. Consequently, several assassination attempts were made on his life. The most famous of these was by the settlers’ resistance group Organisation de l’armée secrète (OAS) in August 1962 when he and his wife’s car was sprayed with machine gun fire arranged by Colonel Jean-Marie Bastien-Thiry at Petit-Clamart. The Colonel had been born from a family of Catholic military officers and married to the daughter of Georges Lamirand who had been Vichy France General Secretary of Youth from September 1940 to March 1943. He was also a member of the organization, “Vieil État-Major.” Jean Cantelaube, a former security officer of De Gaulle, was recently identified as an intelligence agent who provided information to Bastien-Thiry’s organization, thus making a possible extra link to Le Cercle, traditionally embedded in French Intelligence. [8] This was more than enough to make him a target of Le Cercle, and though no evidence exists in any participation in the assassination plot, given Bastien-Thiry’s background it is more than a probability that Le Cercle, if not complicit, would have been clapping their hands with glee at the opportunity.

clip_image002Otto von Hapsburg

clip_image004Jonathan Aitken

clip_image006Konrad Adenauer

clip_image008Michael Howard

clip_image010Lord Norman Lamont

clip_image012Brian Crozier

Le Cercle’s primary intelligence go-between and PR guru journalist Brian Crozier was perhaps the most efficient and effective in disseminating the KGB-under-the-bed propaganda which was drawn from the group’s intense hatred of all things communist. Soviet infiltration plots notwithstanding, it is far more likely that Capitalist-Communist hybrids of corporatism encouraged by the Rockefellers were dominating rather than there being KGB agents everywhere as Le Cercle members claimed. (If we keep in mind that it is essential psychopathy that uses any ideology to further its ends, it is not so much about the evil of communist or capitalist influence as it is the importance of psychopathic clusters to maintain their dominance over ordinary people. To do that, they must infiltrate all religious, political and social institutions in order to progressively hijack certain principles and forge new ones. Thus setting one belief system against another – sometimes in subtle ways – is always the name of the game. So, let’s not get too caught up on polarities. Suffice to say that that fascism, socialism, capitalism and communism are drawn from the same source of distortion, their initial wisdom distorted and used against ordinary people to keep them in spiritual bondage. Le Cercle plays it’s part in that endless divide and rule, even perhaps within the Establishment itself).

To give the reader some idea as to the many and varied networks le Cercle members move in, a random selection of influential members, attendees and Chairpersons follows:

Otto von Hapsburg – As an Austrian member of the Royal House of Hapsburg. The eldest son of Charles I and IV, the last Emperor of Austria and King of Hungary, and his wife, Zita of Bourbon-Parmahe. Strongly anti-Nazi and anti-communist. A Knight of Malta, he was an enthusiastic advocate of Pan-Europeanism. His family has strong historical ties to the Vatican and all things Catholic. Died in 2011.

Sir Peter Tennent – Banker and corporate executive. Heavily involved in War-time intelligence activities after being recruited by Colonel Sir Charles Hambro for the Special Operations Executive (SOE) in 1940. A Knight Bachelor of the Order of Saint Michael and Saint George since 1972. He was a member and CEO of numerous foundations, trusts, hedge funds and corporations. Tennent was also a member of private sector intelligence group “The 61” and an Advisor to Pilgrims Society controlled Barclays Bank. Before he died in 1996, he had chaired several of the meetings of Le Cercle.

Jonathan Aitken –Conservative MP, Banker, writer and Arms dealer. Received an 18-month jail sentence in 1999 for lobbying for GEC, Marconi and VSEL, in order to sell millions worth of weapons to Saudi-Arabia. As director of BMARC he had been happily exporting arms to to Middle Eastern countries including Iraq. CEO of TV-Am and his banking and investment company Aitken Hume Plc and was a member of the Queen’s Privy Council; Minister of State for Defence under in 1992; Served as Chairman of Le Cercle during this period, as confirmed by MP Alan Clark. [9] Protégé of Lord Julian Amery.

Norman Lamont – Conservative MP (with Neo-Conservative connections to the United States) and Member of the Queen’s Privy Council. Lamont had an 11 year stint under N.M. Rothschild & Sons and became director of Rothschild Asset Management. Various ministerial posts under Thatcher and his most public as Chancellor of the Exchequer under John Major. Numerous domestic and international roles in commerce and finance including Chairman of the G7 group in 1992, negotiator at Maastricht; Advisor to Monsanto. Current Chairman of Euro-Sceptic think-tank Bruges Grp and said to be current Chairman of Le Cercle.

2011 saw his involvement in obstructing the Carroll Foundation Trust and parallel Carroll Maryland Trust billion dollars offshore tax evasion fraud scandal now encircling 10 Downing Street and the Conservative Party. It is “one of the biggest tax fraud scandals in living memory” and the ‘obstruction and co-ordinated cover-up’ is due to FBI Scotland Yard prosecution files naming high value suspects which extend deep into top-level banking and corporate echelons. Still under investigation during the coalition government of David Cameron and Nick Clegg Lord Lamont is one of many whose present pedestal remains in question. A total black-out on reporting in mainstream newspapers has been in effect since 2012. [10]

Prince Turki al Faisal – father was King Faisal, a major force behind the Arab oil embargo against the United States in 1973; nephew of the late King Fahd al-Saud, head of the House of Saud; Faisal studied at Princeton, Cambridge, and Georgetown Universities; Chairman King Faisal Centre for Research and Islamic Studies. Co-Founder King Faisal Foundation; CFR attendee; DAVOS attendee; headed Saudi foreign intelligence services from 1977 to September 1, 2001; supported the Afghan resistance against the Soviet invasion; Saudi Ambassador to Great Britain; named in a lawsuit from relatives of several hundred September 11 victims due to Saudi / bin Laden links to 9/11; friend of Prince Charles and Camilla Parker-Bowles and the Bush family.

Michael Howard – Lawyer, Chairman of the Bow Grp 1970; Parliamentary Under-Secretary of State at the Department of Trade and Industry in 1985; responsibility for regulating the financial dealings of the City of London; one of the architects and supporters of the council or poll tax under Thatcher; various high-level government posts in the Thatcher government; tough reputation on the causes of crime. As Home Secretary his reputation was tarnished: “When he … released high-level drug dealer John Haase from prison just 10 months into an 18-year sentence, along with his associate Paul Bennett. Haase’s criminal career began with armed robberies in the 1970s. He moved on when he realised there was much more money to be made in heroin. He took control of the British end of the southern route for heroin smugglers, which runs from Afghanistan to Britain via Turkey and the Balkans. A member of Haase’s gang, Simon Bakerman, imprisoned for running an amphetamine factory, is Michael Howard’s cousin.” Junior minister at the time, Anne Widdicombe’s remark immortalized Howard’s persona when she remarked that “there is something of the night about him.”

Konrad Adenauer – a CIA asset and architect of West Germany’s economic recovery; Lord mayor of Cologne 1917. Lawyer, Pan Europa Union follower; hard-line anti-communist and associated with many known former Nazis including General Reinhard Gehlen; associate and signatory of the Treaty of Rome; received the Magistral Grand Cross personally from SMOM (The Sovereign Military Order of Malta) Franz-Josef Bach his Personal assistant was a German Ambassador to Iran and consultant and lobbyist for corporations including Siemens, Nippon Electric and Northrop-Grumman. He died in 2001.

The promotion of Franz Josef Strauss in terms of office and image inside and outside of Germany was also part of the le Cercle agenda as evidenced in the above published sources. Any accusations and criticism of Strauss was countered by denouncing the detractors as communist agitators. Strauss was a Le Cercle faithful and his friends rallied to his cause. A hard-right Roman Catholic Christian of the Social Union of Bavaria (CSU), he was buffered and protected throughout his life and career amid countless family scandals.

Reijden’s research places the following members as chairman/ President since the 1950s to the present day:

clip_image014_thumb.jpg

Lord Julian Amery MI6 agent, 1001 Club, Operative and Cercle chairman [13] His father Leo Amery was a key Round table member

Chairman/President /Term

  • Antoine Pinay 1950s – 1970s
  • Jean Violet 1970s – 1980
  • Brian Crozier 1980 – 1985
  • Julian Amery 1985 – 1990s
  • Jonathan Aitken 1990s – 1996
  • Lord N. Lamont 1996 – today [11]

The achievements of Le Cercle have been better understood from the 1975 leaking of documents from the Institute for the Study of Conflict (ISC) and further revelations from German intelligence officer Hans Langemann, a former head of Bavarian State Security in the 1970s and early 1980s. With the help of a colleague who attended Le Cercle meetings full briefings were passed on to Langemann in exchange for intelligence information of his own. He sold the information to Kronket Magazine which eventually ended up in Der Spiegel in the early 1980s.

From this information we can see that le Cercle influence is not insubstantial. Through its virulent anti-communist paranoia it played a key role in bringing Margaret Thatcher to power with several le Cercle members hovering in her sphere, including Brian Crozier whose covert advisory committee, “Shield” played a crucial role:

The initial idea for Shield came from MI6 agent Sir Stephen Haskings, a friend of Crozier who had formerly been a SAS soldier and SOE officer. Crozier put together Thatcher’s election campaign by adopting Jean Violet’s Psychological Action program, a technique to find quick, short answers to three basic questions: What do people want? What do they fear? And what do they feel strongly about? Shield also completely convinced Thatcher about the severe threat of domestic communist subversion. After Crozier and Haskings handed her their paper ‘The diabolical nature of the Communist conspiracy’, Thatcher’s reaction was, “I’ve read every word and I’m shattered. What should we do?’” [12]

The Round Table’s presence in South Africa also had many Le Cercle members by virtue of the inevitable crossovers the evolution of the two groups engendered. Though both differed substantially on ideology there were also many similarities rooted in aristocracy and British Empire traditions. Rhodesia and South Africa was largely owned and manipulated by these two powerful groups. Cecil Rhodes, a Rothschild / Round Table agent and Julian Amery a Le Cercle Chairman and highly influential 1001 Club member were two of a kind and rooted in British fascism and post-war imperialism.

Finally, several members of Le Cercle played a prominent role in the Afghan war. The alleged Polish Venetian Nobility descendent Zbigniew Brzezinski, National Security advisor to Carter, was the architect of the Mujahideen guerrilla network. With assistance from another Le Cercle member and Knight of Malta, CIA director William Casey, he helped to push the Soviets out of the country leading to its eventual collapse.

 


Notes

[1] ‘Aitken dropped by the Right’s secret club’, The Independent, June 29, 1997.
[2] ‘Le Cercle and the struggle for the European continent: Private bridge between Vatican-Paneuropean and Anglo-American intelligence’ By Joël van der Reijden, November 18, 2006/Update: July 29, 2007 / Version: 1.02 / Original report of ISGP on Le Cercle: July 26, 2005.
[3] Ibid.
[4] ‘The Pinay Circle and Destabilisation in Europe’, By David Teacher, Lobster Magazine, November 1988, Issue 17.
[5] The EU: The Truth About The Fourth Reich: How Adolf Hitler Won The Second World War (2014) [Kindle Edition] by Daniel J Beddowes Flavio Cipollini.
[6] op. cit. van der Reijden.
[7] Crawley, Aidan (1969). De Gaulle. London: The Literary Guild. ASIN B000KXPUCK.(p.381)
[8] Cantelaube’s notes quoted in Jean-Pax Meffret’s book; attempt accomplice interviewed by Olivier Cazeaux
[9] ‘Aitken dropped by the Right’s secret club’ By Chris Blackhurst, The Independent, June 29, 1997.
[10] http://www.carrolltrustcase.com/
[11] op. cit. van der Reijden.
[12] Ibid. Reijden. He quotes Crozier’s book Free Agent which fleshes out the whole story and The Telegraph report from January 11, 2005, ‘Stephen Hastings’ obituary’.
[13] November 1988 Issue 17, Lobster Magazine, ‘Brian Crozier, the Pinay Circle and James Goldsmith’ (quoting from the Langemann papers); 1993, Alan Clark, ‘Diaries’, p. 369-374; 1993, Brian Crozier, ‘Free Agent’, page 193; June 29, 1997, The Independence, ‘Aitken dropped by the Right’s secret club; Is it the ultimate dishonour’ (claims Amery was chair before Aitken); February 1, 1998, News Confidential, ‘Jonathan Aitken MI6, CIA?’

Puppets & Players I

By M.K. Styllinski

“What differentiates a sociopath who lives off the labors of others from one who occasionally robs convenience stores, or from one who is a contemporary robber baron – or what makes the difference between an ordinary bully and a sociopathic murderer – is nothing more than social status, drive, intellect, blood lust, or simple opportunity What distinguishes all of these people from the rest of us is an utterly empty hole in the psyche, where there should be the most evolved of all humanizing functions.”

Dr. Martha Stout, “The Sociopath Next Door”

***

“To give you some idea of the enormity of the problem that faces us, consider that there are at least 2 million psychopaths in North America; the citizens of New York City have as many as 100,000 psychopaths among them. And these are conservative estimates. Far from being an esoteric, isolated problem that affects only a few people, psychopathy touches virtually every one of us. Consider that the prevalence of psychopathy in our society is about the same as that of schizophrenia, a devastating mental disorder that brings heart-wrenching distress to patient and family alike. However, the scope of the personal pain and distress associated with schizophrenia is small compared to the extensive personal, social and economic carnage wrought by psychopaths. They cast a wide net, and nearly everyone is caught in it one way or another.”

Dr. Robert Hare, “Without Conscience”

***


moloch

Moloch of Totalitarianism – A Memorial dedicated to the victims of totalitarian regimes. Situated at Levashovo, Saint Petersburg, Russia. (wikipedia)

Perhaps all the empires of ancient and modern history were test runs for the psychopath; the ebb and flow of their rule as valuable cycles to hone their skills in understanding the curious majority of humanity who harbour conscience and creativity.

Pathocracy has been fleshed out under a variety of names most notably the New World Order, Globalisation, World State and the Last Great Empire. Total world domination amusingly popularised by James Bond villains and countless mercurial, dark-cloaked figures cackling at their own despotic genius simply harks back to a very real and ancient archetype of evil, tenaciously holding onto the long-term prize of absolute control by the select few.

The question is not whether the psychopath’s dream of ultimate control will succeed because we know it will not since the very nature of entropy means that it must eventually collapse. The concern is how much chaos they will stimulate during their deluded rise to omnipotence and whether or not we can modify and ameliorate the worst of its effects. To outwit the anti-humans we cannot become like them which is what they would heartily wish. We must learn to know their ways just as thoroughly as they know ours. We must start with plumbing the depths of their evil by comprehending that there is literally no limit for the psychopath, no depths to which he will not stoop to achieve his ends and no reasoning which might persuade him to give up.

Our first realisation is that the psychopath blends in with normal human beings in order to fit in. Once this is accomplished the institutional and ceremonial (occult) psychopaths set about subverting them. Meantime, he goes about his business unnoticed and unhindered, often seen as a trusted pillar of the community. As masters of mimicry and manipulation, he can insinuate himself into groups, organisations and institutions. His – or her – charisma, cold efficiency and fearless demeanour can serve to short-circuit the intuitions of his normal associates who might sense that something is “off.” However, when the dopamine and serotonin are flowing, critical faculties are replaced by wishful thinking and the projection of our values and conscience takes place and it is then that psychopath knows that he has us in the palm of his hand.

Official Culture is designed to deify the alpha male and the femme-fatale so that competitive dominance of the lowest instincts continues to appeal to the lowest yardstick of human aspiration. Who could believe that such a dynamic philanthropist and family man could be nothing more than a reaction-machine seeking to feed? Yet, you will find their footprints – known or unknown – in the blood of all the atrocities, genocides, wrong-doings and pointless wars throughout history. No historian will mention such a repeating pattern; no social scientist will attribute this to the presence of the psychopath endlessly doing “what he wilt,” safe in the knowledge of human ignorance.

Nothing is more useful to the psychopath than the mantle of the holy or just. Our incredulity is his most effective weapon for the continuance of emotional and physical carnage. Psychologist Dr. Andrew Łobaczewski mentions that when a suitable ground has been laid for ponerological influences to seed: “… one kind of evil feeds and opens doors for others regardless of any individual or doctrinal motivations.” Once the psychopath has been invited in, due primarily to a lack of psychological knowledge, it is almost impossible to prevent the fulfilment of his desires. Łobaczewski further states: “Since pathological factors are present within the syntheses of most instances of evil, they are also present in its continuum.” [1]

Hence the problem of our hamster-wheel of repeating lessons where the most vulnerable continually suffer.

When psychopaths rule society, their worldview is inevitably expressed to the detriment of us all. And because deceit is the means by which they enforce their will, it appears to be humane and eminently logical because we are not used to encountering such bare-faced lies and deception. In front of the psychopathic personality our ability to think critically is severely curtailed, thus paramoralisms, paralogical discourse and “doublethink” becomes institutionalised so that ethics and morality are steadily inverted eventually signifying the exact opposite of their original meaning. The spread of pathological disease follows the same vacuum, until: “The actions of this phenomenon affect an entire society, starting with the leaders and infiltrating every village, small town, factory, business, or farm. The pathological social structure gradually covers the entire country, creating a ‘new class’ within the nation. This privileged class of deviants feels permanently threatened by the ‘others.’” [2]

This time, instead of the Jews, Poles, gypsies and homosexuals – we are ALL in the psychopaths’ sights.

***

The Three Establishment Model (3EM)

Frequent mention of the word “Establishment” has been made in this series and it is time to look at its internal constituents. Although differing in methods and ideological roots, there are many groups and sub-factions seeking to herd humanity, all of whom are defined by the principles of neo-feudalism as a common objective. Whether it is Chabad Lubavitch or the Council on Foreign Relations, all believe in an ideal which encompasses occult, religious, corporate and military objectives and which guarantees some order of Elite rule over the mass of humanity. Isn’t that inevitable? Isn’t a certain amount of autocracy necessary? Not one our social systems are pathologically compromised and when both lead to and from each other.

In order to make at least a partial attempt at making sense of where all these players are on the field of psychopathy, talented Dutch researcher Joël van der Reijden of the Study of Globalisation and Covert Politics has made and excellent structural contribution and it is from this that the following information is largely based. (You can find a mirror site now taken on by WikiSpooks here)

Reijden has created the template of a “Three Establishment Model” (3EM) which comprises of three major lines of force dominant in the world today, each of which has an ideology and belief system which stretches back centuries. These are Liberal, Conservative and Zionist each of which has a complex set of sub-groups, linked in common purpose though experiencing varying degrees of harmony or friction. Due to their close religious and political aims the United States and Europe are combined. The category boundaries are more blurred than they may appear, with all the groups and sub-groups working with each other when expedient.

I have used my own template from the same source information and with minor additions of my own below. This is obviously not a definitive version since no one can really know the nature of this occult body as it uses convenient proxy organisations and committees to act as vehicles for its social engineering which then filter into public life, with various degrees of success. It is probable that this upper most occult body has very few members indeed.


image

Source: M.K. Styllinski PDF notes.

© infrakshun

Pathocrats

Magnification of Round Table Movement and Rothschild origins within Anglo-American/Liberal Establishment 

© infrakshun


The Liberal Establishment comprises the Anglo-American / Venetian Nobility with their spheres of influence predominantly focused within banking and commerce. British royalty, The Bank of England, The House of Rothschild, The Federal Reserve cartel, Goldman Sacs, JP Morgan Chase and Rockefeller-Kissinger interests are also to be found in this grouping. Round Table membership, The Royal Institute for International Affairs, Trilateral Commission, Bilderberg Grp. and Council on Foreign Relations are also here busy thinking ahead to the incremental deployment of their plans, perhaps more than 100 years in advance. (Yes, that’s right). One World Religion, New Age CoIntelpro and liberal-collectivist networks which have initiated so much social engineering are also to be found within this section. All have strong links to Freemasonic European occultism. Hundreds of NGOs under the umbrella of the United Nations derive their support and succour from this model with George Schultz’s Bechtel corporatism promoting Arab oil interests as the focus rather than Israeli expansionism. Eco-fascism and the 1001 Club while present, has a stronger connection to the Conservative Model, many of whom hold in disdain the gradualist, progressive and New Age elements.

Diplomacy over pre-emptive strike is preferred but the corporate fascism is exactly the same as the Conservative model. Most of the key members are found within The Pilgrim’s Society. The type of envisaged totalitarianism is Huxleyian / Fabian rather than Leninist / Orwellian in that social engineering is driven by developing a sensate culture that will be “Amused to Death” witht symptoms of Stockholm syndrome, where authority is exercised through dumbing down and Pavlonian pleasure techniques which delivers long-term servitude through proffered lifestyles of leisure and pleasure and which come to define individual and collective reality. The Technocratic-Google-based PR and transhumanist ethos is very much a part of this model and the emphasis on SMART/Sustainable Development.

Although essential psychopathy is clustered across the whole of the 3EM, we might venture to say that there is a predominance of pathological narcissists, schizoidal and aesthenic psychopaths or the more mentally polarized types of psychopathy found here.

The Conservative Establishment might best be summed up by the famous Statement of Dwight Eisenhower who warned against the uncontrolled power of the “defence establishment” or “military-industrial complex.” The military has a large undercurrent of occult and religious fascism sourced largely from the Nazi-nexus of Pentagon-CIA and Vatican influences most notably from Operation PAPERCLIP, ODESSA and the Rat Lines during and after the Second World War. Contained within Vatican and Synarchist objectives is the most secretive group: Le Cercle (The Circle) who represents the most fascist elements within European geo-politics via NATO and CIA–MI6 intelligence. Historically working with many fascist regimes of the past, Le Cercle is known for its protection of European child rape networks to drugs and arms running in Africa and Saudi Arabia. Sir Julian Amery was a powerful intermediary of Le Cercle liaising between 100 Club, the Safari Club, Round Table and Rothschild interests.

The Pan-European Synarchists also have an enormous influence in both politics and freemasonry. The American Security Council, National Security Apparatus, Police State crackdowns, and the emergence of Zionism working with Neo-Conservatism define the aggressive short-term strategies of this model. Due to the predominance of right wing religious authoritarianism there will be a high incidence of essential psychopaths and social dominators on the frontlines. Generally, this is the brutish, Leninist version of collectivism and Mussolini’s definition of fascism as corporatism that uses immediate crushing force to achieve its ends.

The loss of human and civil rights, the rise of Big Brother surveillance within the US and Europe are formulated in this model, though there are obvious ties across the 3EM as a whole. The Cult of the CIA and links to MI6 Synarchist factions are key in the continuation of the “War on Terror” and false–flag attacks with an uneasy assistance from the MOSSAD spy-network. Major child abuse networks of a non-ritual or occult ritualistic nature are found in all models but particularly prominent in Conservatism. Knights of Malta and Opus Dei express their designs within the Vatican Pan-European Networks with the late Otto von Habsburg, a traditional fascist, the last crown prince of the Vatican-allied Austro Hungarian Empire as a key mover and shaker. According to Reijden: “Its primary interest has been the resurrection of the Holy Roman Empire by manipulating the European Union, although this agenda has met with stiff resistance from the Liberal Establishment.”

The Zionist Establishment has a Jewish socio-cultural platform in both Israel and America. It has a most effective 5th column which has been ensconced within successive US administrations (fiscal and defence departments) further complemented by an Israeli Lobby and the Ultra-Right wing, Messianic cult of Chabad Lubavitch at the highest levels of US politics.

Thanks to the advanced techniques and know-how of MOSSAD intelligence and American Zionism channelled through corporate and banking families established since the turn of the last century, the power of Israel’s political and economic leverage is considerable. Propaganda and lobbying are given particularly large teeth through media outlets which are designed to be sympathetic to Israeli policies over Palestinian human rights. Israel is also a destination and transfer hub for drugs and human trafficking via the Jewish-Russian Mafia which has its home in Russia (much to the Chagrin of Putin) the US and Israel acting as the biggest and most extensive International mafia organization. Though with far less think-tanks and organisations, the web of interconnected assets within both MOSSAD and American-Jewish sayanim networks makes the Zionist Establishment models one of the most far-reaching, complex and coercive methods of mass control in the world today.

Of course, the House of Rothschild empire has made its purpose to act as the primary financier of the Three Model Establishment and as such, has an unassailable position with the ever-present, latent animosity toward their Gentile comrades within the ruling Elite branches. They have their fingers in every possible monetary pie with older members of the board liasing with high level members of MOSSAD who is alleged to be involved with an Occult Zionism based on the black magick principles of the Babylonian Talmud and Kabbalah.

The Western tradition of freemasonic Illuminism / Rosicrucianism and its relationship to Occult Zionism is purely in the realms of even more speculation. My hunch is that the two paths are largely separate but come together in some form higher up within the small capstone of the overall pyramid – the Global Occult Body itself.

 


Notes

[1] p. 132; Łobaczewski; Political Ponerology.
[2] Ibid; p.117.