Israel-Palestine

Return of the Eschatological Scheme: In Islamic State / ISIS geopolitical void, former Egyptian Jihadi Chief Sheikh Nabeel Naiem cites "Clean Break" strategy as overall US/Israeli game plan for Middle East

NabilNaeemAbulFattah3.png

"This is the Fourth-Generation Warfare, agents instead of soldiers…"

Lending unexpected credence to a hunch, a jihadi legend, Sheikh Nabeel Naiem, claimed on Lebanese television that the "Islamic State" (ISIS/ISIL) situation was congruent with a "Clean Break" document attributed to Cheney, neoconservatives associated with Netanyahu, & the Project for a New American Century (PNAC) crowd.

NabilNaeemAbulFattah1.png

The overall plan to "balkanize" the Middle East goes back before World War I & in British plans to try to get Greater Turks to rebel against Imperial Russia - today, the US, Israel, Saudi Arabia, Turkey, Qatar, Iran & others play dangerous games in supporting different militant movements. As in 1996, when the Clean Break plan was published, the Netanyahu crowd calls the shots in Tel Aviv. (That was the year he first took office)

NabilNaeemAbulFattah2.png

The jihadi veteran (who led Egyptian Islamic Jihad from 1988 to 1992, jailed by Mubarak from 1991 until the regime collapse in 2011) helps point out the ISIS overall scheme. He explains how Saudi intelligence configured his financing for terror camps & Afghanistan operations in the 1980s, giving his incredulous jihadi veteran high-level manager perspective to how ISIS started at well-funded camps in Jordan with US (CIA) support. "It wasn't a loose charity" back in his day!

NabilNaeemAbulFattah5.png

He concludes overall that the plan is to get Sunnis & Shiites fighting each other under the general rubric of a Clean Break-like super-beef among Middle Eastern peoples, therefore a plan must be put up to get people to think clearly and avoid space cadet takfiri thinking, offering alternatives. The whole video is worth watching:

See previously: Jordanian prince discerns suppressed American/Israeli extremist plan to shatter Arab nationalism into statelets: Re-Ottomanization & Oded Yinon revisited | HongPong.com [April 2007]. On March 17 2003 I wrote a post on everything2.com about 'A Clean Break: A New Strategy for Securing the Realm' which I think still holds up quite well today including the emphasis on consequences for Syria. I also interviewed Prof. Rashid Khalidi that year touching on 're-ottomanization' & the Clean Break approach - excerpted below. It is weird to peg something like this so long ago and have it continue to roll along 11 years later...

It's hard to judge this guy's credibility - purportedly a high-level coordinator between intelligence agencies and Islamist field rebels, living with Zawahiri & playing a key role assassinating Anwar Sadat.

I have not seen any video illustrating the conflict at this level & over the 40 minutes -- the host tries to draw him to more practical concerns and he later brings it back to explain how Clean Break style tactics are the intent of the West at this time. We can sense this is a priority he wants attention put to. Also he has some laughs about oblivious western journalists reporting individual contributions, missing larger developments completely:

NabilNaeemAbulFattah4.png

Unfortunately there are many other illustrative videos & materials caught behind the language barrier, fortunately this got translated. I couldn't sort out the orientation of the parent YouTube channel but it seems anti-Salafist.

The full transcript provided by SyriaNews.cc is posted after the Clean Break & Yinon Plan. The TV network is also interesting:  Wiki: "Al Mayadeen (Arabic: الميادين‎; English: Public Squares) is a pan-Arabist satellite television channel launched on 11 June 2012 in Lebanon." According to Wiki the program director is a former head of Al Jazeera Beirut & Iran divisions, and most of the staff are former AJ people, Some see it as more aligned with Iran. Kurt Nimmo did a decent writeup on this in PrisonPlanet as well.

Be sure to also read a 2013 interview with him: Egyptian jihadist leader: Bin Laden blew himself up to avoid capture | GulfNews.com:

Sitting in a poor apartment beside the archaic Roman Catholic Patriarch in Al Zaher, one of the oldest neighbourhoods in Cairo, Abdul Fattah recalls his history as a leader of Egypt’s Al Jihad organisation, which assassinated the late president Anwar Sadat in 1981, waged a terrorist war in the 1990s and helped give birth to Al Qaida. He was once “the right arm” of Ayman Al Zawahiri, the former Al Jihad leader who now heads Al Qaida. “I am the one who sent Mohammad Atta to Afghanistan,” Abdul Fattah says proudly of the lead pilot of the September 11, 2001, attacks.

Abdul Fattah was released from prison in March 2011, just weeks after the fall of Hosni Mubarak, who had kept him locked up for 20 years. Al Jihad abandoned violence in Egypt years ago. “We were exhausted,” he says, and at 57, he looks it. The former jihadist concedes that Egypt is headed toward Western-style democracy: “It’s the only available option.”

//////

The Clean Break document written in June 1996 was only one in a track of strategic thinking in Israel associated with Vladimir Jabotinsky's Revisionist Zionist movement which led to the Likud Party & Ariel Sharon's movement to expand West Bank, Gaza & Sinai settlements. Another similar proposal, the "Yinon Plan", was publicized in 1982 by sometimes controversial Holocaust survivor, lecturer & writer Israel Shahak. The Yinon Plan touches on conflict in Libya & Sudan -- areas now in upheaval, part of a broader destabilization triggered by NATO's intervention taking out Khaddafi.


A full copy of Clean Break & the June 2013 Globalresearch.ca version of the Yinon plan by Michel Chossudovksy are attached below.

////////

A Clean Break: A New Strategy for Securing the Realm - Everything2.com - By HongPong - Published Mon Mar 17 2003

"...A report about how Israel could transcend the problems with the Palestinians by changing the "balance of power" in the Middle East, and by replacing Saddam. The hawks saw their big chance after 9/11, but they feared that it would be hard to sell a eschatological scheme to stomp out Islamic terrorism by recreating the Arab world. So they found Saddam guilty of a crime he could commit later: helping Osama unleash hell on us." --Maureen Dowd, Bush Ex Machina, NY Times, Mar. 2, 2003.1
"They could not have known that four years later that the working paper they prepared, including plans for Israel to help restore the Hashemite throne in Iraq, would shed light on the current policies of the only superpower in the world." --Akiva Eldar, Perles of Wisdom for the Feithful, Ha'aretz, Oct. 1, 2002.2

This increasingly interesting document was developed like much democratic government policy today, within the machinations of various think tanks. The 'study' was written for Israel's incoming Netanyahu administration in 1996, by a group of 'prominent opinion makers' for the Israeli-American Institute for Advanced Strategic and Political Studies.

What is surely most important about the document is its authorship. The group leader was Richard Perle, a Jewish neoconservative who hand-delivered the report to Netanyahu himself. Today Perle, nicknamed 'The Prince of Darkness,' sits as the chairman of the Defense Policy Board in the Pentagon. He is a director of the increasingly conservative Jerusalem Post and an architect of foreign policy at the American Enterprise Institute. Perle, certainly, is one of the key government advocates of today's war against Iraq. Other authors have become very important in the Bush circle of advisors as well. Douglas Feith is now Undersecretary of Policy at the Pentagon, a top Rumsfeld adviser. Feith is regarded as a strong believer in Jewish settlement of Judea and Samaria (the West Bank), and a longtime opponent of Arab-Israeli peace agreements in general.3, 4, 5 David Wurmser is now the director of Middle East studies at the powerful American Enterprise Institute. 6 Meyrav Wurmser now heads up the Center for Middle East Policy at the Hudson Institute. Robert Loewenberg also participated in the study in his position as president of the Institute for Advanced Strategic and Political Studies.

These are powerful people in and around the government today. They unquestionably have the president's ear on matters of Middle East policy. Bush's recent Mideast policy speech at the American Enterprise Institute confirmed this.7, 8

The study was written in June 1996, and many political factors have changed around Israel since then. Much of the study involves Syrian 'aggression' and 'challenge' in Lebanon. This situation is different now that Israel has left Lebanon, but the basic hostile arguments towards local regimes remain. Clearly, this document contains advanced strategy about inter-Arab relations, which are conspicuously lacking from the Bush presidency's proclamations towards Iraq and other Middle Eastern issues. The study asserts an understanding of Arab political behavior, and an Israeli right to act with pre-emption to alter the threat from Arab states, regardless of consequences to the United States and the world at large. I am suspicious of the contrast between the Machiavellian strategizing here and the broad generalities about 'democracy' and such waved around by the Bush Administration today.

The basic thrust of the study claims that Israel can 'transcend' its conflict with the Palestinians and Arab world by taking control of its 'strategic environment.' This involves destabilizing various regimes supporting 'terror' and 'challenging' Syria. Overthrowing Saddam Hussein is a "an important Israeli strategic objective in its own right - as a means of foiling Syria's regional ambitions."

It goes on to outline different ideas towards the goal of a "proud, wealthy, solid, and strong" Israel which will escape the conflict, apparently by rearranging the Arab power structure around Israel, finally rendering the Arabs quiescent to Israeli strategic goals. Perle et al. make unusual arguments over 'claim to the land,' in an argument which today is usually invoked to justify the Jewish settlement of the West Bank and Gaza Strip. The settlements are obliquely referred to, as the authors refute the general Oslo principle of 'land for peace,' which usually is taken to mean returning the occupied territories to Arab control.

The study supports a hegemonic view of the military occupation in south Lebanon, let alone the West Bank and Gaza. Relations with the Palestinians are important here, but the references to 'Palestinian controlled areas' or 'Palestinian areas' doesn't reinforce the notion of the West Bank or Gaza as one territorial unit, as the United Nations has demanded. I think this document expresses a normalized view, widespread in 1996 Israel, that the Occupation had been 'solved' and economic growth via settlement expansion was a natural part of the Zionist project. There has been very little public evidence from Perle and his neocon associates to contradict this acceptance of Israeli settlement policy. In the study's remarks on a new spirit for the Zionist project, it is difficult to see that the settlement issue is at all divided from Israeli national interest in any way whatsoever. Ariel Sharon, the undisputed master of settlement construction, finds refuge in this presidency for many reasons.

This document raises some questions.

  • If, in 1996, these neoconservatives believed in Israel "transcending" its conflict, prior to the outbreak of the second Intifada, what do they believe now?
  • As part of the top dozen or so civilian military overseers in the most powerful military in history, what sort of position are they in to make this happen?
  • What impact would a strategy like this have on places like Iran and in particular Syria? What will these men advise be done against 'terrorist' Hezbollah? How will Iran and Syria respond?
  • What understanding of the nation-state are they looking at? Fundamentally, what are these strategists wishing for? Peace?
  • What is the order of things that this document calls for?
In all, it is a fine example of the grand strategic junction we are now finding between Likud interests and Republican interests. Or "Israeli and American interests," as Perle's Jerusalem Post recently put it. Moral "clarity" and the application of military force, oodles of it. I've tried to make some entertaining and enlightening pipelinks which help lead to other information. It's coo like dat.

A Clean Break:
A New Strategy for Securing the Realm


Following is a report prepared by The Institute for Advanced Strategic and Political Studies' "Study Group on a New Israeli Strategy Toward 2000." The main substantive ideas in this paper emerge from a discussion in which prominent opinion makers, including Richard Perle, James Colbert, Charles Fairbanks, Jr., Douglas Feith, Robert Loewenberg, David Wurmser, and Meyrav Wurmser participated. The report, entitled "A Clean Break: A New Strategy for Securing the Realm," is the framework for a series of follow-up reports on strategy.

Israel has a large problem. Labor Zionism, which for 70 years has dominated the Zionist movement, has generated a stalled and shackled economy. Efforts to salvage Israel's socialist institutions-which include pursuing supranational over national sovereignty and pursuing a peace process that embraces the slogan, "New Middle East"--undermine the legitimacy of the nation and lead Israel into strategic paralysis and the previous government's "peace process." That peace process obscured the evidence of eroding national critical mass- including a palpable sense of national exhaustion-and forfeited strategic initiative. The loss of national critical mass was illustrated best by Israel's efforts to draw in the United States to sell unpopular policies domestically, to agree to negotiate sovereignty over its capital, and to respond with resignation to a spate of terror so intense and tragic that it deterred Israelis from engaging in normal daily functions, such as commuting to work in buses.

Benjamin Netanyahu's government comes in with a new set of ideas. While there are those who will counsel continuity, Israel has the opportunity to make a clean break; it can forge a peace process and strategy based on an entirely new intellectual foundation, one that restores strategic initiative and provides the nation the room to engage every possible energy on rebuilding Zionism, the starting point of which must be economic reform. To secure the nation's streets and borders in the immediate future, Israel can:

This report is written with key passages of a possible speech marked TEXT, that highlight the clean break which the new government has an opportunity to make. The body of the report is the commentary explaining the purpose and laying out the strategic context of the passages.

A New Approach to Peace

Early adoption of a bold, new perspective on peace and security is imperative for the new prime minister. While the previous government, and many abroad, may emphasize "land for peace"- which placed Israel in the position of cultural, economic, political, diplomatic, and military retreat - the new government can promote Western values and traditions. Such an approach, which will be well received in the United States, includes "peace for peace," "peace through strength" and self reliance: the balance of power.

A new strategy to seize the initiative can be introduced:

TEXT:

We have for four years pursued peace based on a New Middle East. We in Israel cannot play innocents abroad in a world that is not innocent. Peace depends on the character and behavior of our foes. We live in a dangerous neighborhood, with fragile states and bitter rivalries. Displaying moral ambivalence between the effort to build a Jewish state and the desire to annihilate it by trading "land for peace" will not secure "peace now." Our claim to the land -to which we have clung for hope for 2000 years--is legitimate and noble. It is not within our own power, no matter how much we concede, to make peace unilaterally. Only the unconditional acceptance by Arabs of our rights, especially in their territorial dimension, "peace for peace," is a solid basis for the future.

Israel's quest for peace emerges from, and does not replace, the pursuit of its ideals. The Jewish people's hunger for human rights - burned into their identity by a 2000-year old dream to live free in their own land - informs the concept of peace and reflects continuity of values with Western and Jewish tradition. Israel can now embrace negotiations, but as means, not ends, to pursue those ideals and demonstrate national steadfastness. It can challenge police states; enforce compliance of agreements; and insist on minimal standards of accountability.

Securing the Northern Border

Syria challenges Israel on Lebanese soil. An effective approach, and one with which American can sympathize, would be if Israel seized the strategic initiative along its northern borders by engaging Hizballah, Syria, and Iran, as the principal agents of aggression in Lebanon, including by:

Israel also can take this opportunity to remind the world of the nature of the Syrian regime. Syria repeatedly breaks its word. It violated numerous agreements with the Turks, and has betrayed the United States by continuing to occupy Lebanon in violation of the Taef agreement in 1989. Instead, Syria staged a sham election, installed a quisling regime, and forced Lebanon to sign a "Brotherhood Agreement" in 1991, that terminated Lebanese sovereignty. And Syria has begun colonizing Lebanon with hundreds of thousands of Syrians, while killing tens of thousands of its own citizens at a time, as it did in only three days in 1983 in Hama.

Under Syrian tutelage, the Lebanese drug trade, for which local Syrian military officers receive protection payments, flourishes. Syria's regime supports the terrorist groups operationally and financially in Lebanon and on its soil. Indeed, the Syrian-controlled Bekaa Valley in Lebanon has become for terror what the Silicon Valley has become for computers. The Bekaa Valley has become one of the main distribution sources, if not production points, of the "supernote" - counterfeit US currency so well done that it is impossible to detect.

Text:

Negotiations with repressive regimes like Syria's require cautious realism. One cannot sensibly assume the other side's good faith. It is dangerous for Israel to deal naively with a regime murderous of its own people, openly aggressive toward its neighbors, criminally involved with international drug traffickers and counterfeiters, and supportive of the most deadly terrorist organizations.

Given the nature of the regime in Damascus, it is both natural and moral that Israel abandon the slogan "comprehensive peace" and move to contain Syria, drawing attention to its weapons of mass destruction program, and rejecting "land for peace" deals on the Golan Heights.

Moving to a Traditional Balance of Power Strategy

TEXT:
We must distinguish soberly and clearly friend from foe. We must make sure that our friends across the Middle East never doubt the solidity or value of our friendship.

Israel can shape its strategic environment, in cooperation with Turkey and Jordan, by weakening, containing, and even rolling back Syria. This effort can focus on removing Saddam Hussein from power in Iraq - an important Israeli strategic objective in its own right - as a means of foiling Syria's regional ambitions. Jordan has challenged Syria's regional ambitions recently by suggesting the restoration of the Hashemites in Iraq. This has triggered a Jordanian-Syrian rivalry to which Asad has responded by stepping up efforts to destabilize the Hashemite Kingdom, including using infiltrations. Syria recently signaled that it and Iran might prefer a weak, but barely surviving Saddam, if only to undermine and humiliate Jordan in its efforts to remove Saddam.

But Syria enters this conflict with potential weaknesses: Damascus is too preoccupied with dealing with the threatened new regional equation to permit distractions of the Lebanese flank. And Damascus fears that the 'natural axis' with Israel on one side, central Iraq and Turkey on the other, and Jordan, in the center would squeeze and detach Syria from the Saudi Peninsula. For Syria, this could be the prelude to a redrawing of the map of the Middle East which would threaten Syria's territorial integrity.

Since Iraq's future could affect the strategic balance in the Middle East profoundly, it would be understandable that Israel has an interest in supporting the Hashemites in their efforts to redefine Iraq, including such measures as: visiting Jordan as the first official state visit, even before a visit to the United States, of the new Netanyahu government; supporting King Hussein by providing him with some tangible security measures to protect his regime against Syrian subversion; encouraging - through influence in the U.S. business community - investment in Jordan to structurally shift Jordan's economy away from dependence on Iraq; and diverting Syria's attention by using Lebanese opposition elements to destabilize Syrian control of Lebanon.

Most important, it is understandable that Israel has an interest supporting diplomatically, militarily and operationally Turkey's and Jordan's actions against Syria, such as securing tribal alliances with Arab tribes that cross into Syrian territory and are hostile to the Syrian ruling elite.

King Hussein may have ideas for Israel in bringing its Lebanon problem under control. The predominantly Shia population of southern Lebanon has been tied for centuries to the Shia leadership in Najf, Iraq rather than Iran. Were the Hashemites to control Iraq, they could use their influence over Najf to help Israel wean the south Lebanese Shia away from Hizballah, Iran, and Syria. Shia retain strong ties to the Hashemites: the Shia venerate foremost the Prophet's family, the direct descendants of which - and in whose veins the blood of the Prophet flows - is King Hussein.

Changing the Nature of Relations with the Palestinians

Israel has a chance to forge a new relationship between itself and the Palestinians. First and foremost, Israel's efforts to secure its streets may require hot pursuit into Palestinian-controlled areas, a justifiable practice with which Americans can sympathize.

A key element of peace is compliance with agreements already signed. Therefore, Israel has the right to insist on compliance, including closing Orient House and disbanding Jibril Rujoub's operatives in Jerusalem. Moreover, Israel and the United States can establish a Joint Compliance Monitoring Committee to study periodically whether the PLO meets minimum standards of compliance, authority and responsibility, human rights, and judicial and fiduciary accountability.

TEXT:

We believe that the Palestinian Authority must be held to the same minimal standards of accountability as other recipients of U.S. foreign aid. A firm peace cannot tolerate repression and injustice. A regime that cannot fulfill the most rudimentary obligations to its own people cannot be counted upon to fulfill its obligations to its neighbors.

Israel has no obligations under the Oslo agreements if the PLO does not fulfill its obligations. If the PLO cannot comply with these minimal standards, then it can be neither a hope for the future nor a proper interlocutor for present. To prepare for this, Israel may want to cultivate alternatives to Arafat's base of power. Jordan has ideas on this.

To emphasize the point that Israel regards the actions of the PLO problematic, but not the Arab people, Israel might want to consider making a special effort to reward friends and advance human rights among Arabs. Many Arabs are willing to work with Israel; identifying and helping them are important. Israel may also find that many of her neighbors, such as Jordan, have problems with Arafat and may want to cooperate. Israel may also want to better integrate its own Arabs.

Forging A New U.S.-Israeli Relationship

In recent years, Israel invited active U.S. intervention in Israel's domestic and foreign policy for two reasons: to overcome domestic opposition to "land for peace" concessions the Israeli public could not digest, and to lure Arabs - through money, forgiveness of past sins, and access to U.S. weapons - to negotiate. This strategy, which required funneling American money to repressive and aggressive regimes, was risky, expensive, and very costly for both the U.S. and Israel, and placed the United States in roles it should neither have nor want.

Israel can make a clean break from the past and establish a new vision for the U.S.-Israeli partnership based on self-reliance, maturity and mutuality - not one focused narrowly on territorial disputes. Israel's new strategy - based on a shared philosophy of peace through strength - reflects continuity with Western values by stressing that Israel is self-reliant, does not need U.S. troops in any capacity to defend it, including on the Golan Heights, and can manage its own affairs. Such self-reliance will grant Israel greater freedom of action and remove a significant lever of pressure used against it in the past.

To reinforce this point, the Prime Minister can use his forthcoming visit to announce that Israel is now mature enough to cut itself free immediately from at least U.S. economic aid and loan guarantees at least, which prevent economic reform. (Military aid is separated for the moment until adequate arrangements can be made to ensure that Israel will not encounter supply problems in the means to defend itself). As outlined in another Institute report, Israel can become self-reliant only by, in a bold stroke rather than in increments, liberalizing its economy, cutting taxes, relegislating a free-processing zone, and selling-off public lands and enterprises - moves which will electrify and find support from a broad bipartisan spectrum of key pro-Israeli Congressional leaders, including Speaker of the House, Newt Gingrich.

Israel can under these conditions better cooperate with the U.S. to counter real threats to the region and the West's security. Mr. Netanyahu can highlight his desire to cooperate more closely with the United States on anti-missile defense in order to remove the threat of blackmail which even a weak and distant army can pose to either state. Not only would such cooperation on missile defense counter a tangible physical threat to Israel's survival, but it would broaden Israel's base of support among many in the United States Congress who may know little about Israel, but care very much about missile defense. Such broad support could be helpful in the effort to move the U.S. embassy in Israel to Jerusalem.

To anticipate U.S. reactions and plan ways to manage and constrain those reactions, Prime Minister Netanyahu can formulate the policies and stress themes he favors in language familiar to the Americans by tapping into themes of American administrations during the Cold War which apply well to Israel. If Israel wants to test certain propositions that require a benign American reaction, then the best time to do so is before November, 1996.

Conclusions: Transcending the Arab-Israeli Conflict

TEXT: Israel will not only contain its foes; it will transcend them.

Notable Arab intellectuals have written extensively on their perception of Israel's floundering and loss of national identity. This perception has invited attack, blocked Israel from achieving true peace, and offered hope for those who would destroy Israel. The previous strategy, therefore, was leading the Middle East toward another Arab-Israeli war. Israel's new agenda can signal a clean break by abandoning a policy which assumed exhaustion and allowed strategic retreat by reestablishing the principle of preemption, rather than retaliation alone and by ceasing to absorb blows to the nation without response.

Israel's new strategic agenda can shape the regional environment in ways that grant Israel the room to refocus its energies back to where they are most needed: to rejuvenate its national idea, which can only come through replacing Israel's socialist foundations with a more sound footing; and to overcome its "exhaustion," which threatens the survival of the nation.

Ultimately, Israel can do more than simply manage the Arab-Israeli conflict though war. No amount of weapons or victories will grant Israel the peace it seeks. When Israel is on a sound economic footing, and is free, powerful, and healthy internally, it will no longer simply manage the Arab-Israeli conflict; it will transcend it. As a senior Iraqi opposition leader said recently: "Israel must rejuvenate and revitalize its moral and intellectual leadership. It is an important -- if not the most important--element in the history of the Middle East." Israel - proud, wealthy, solid, and strong - would be the basis of a truly new and peaceful Middle East.

Participants in the Study Group on "A New Israeli Strategy Toward 2000:"

Richard Perle, American Enterprise Institute, Study Group Leader

James Colbert, Jewish Institute for National Security Affairs
Charles Fairbanks, Jr., Johns Hopkins University/SAIS
Douglas Feith, Feith and Zell Associates
Robert Loewenberg, President, Institute for Advanced Strategic and Political Studies
Jonathan Torop, The Washington Institute for Near East Policy
David Wurmser, Institute for Advanced Strategic and Political Studies
Meyrav Wurmser, Johns Hopkins University


Source: http://www.israeleconomy.org/strat1.htm
Footnotes:
1 http://www.nytimes.com/2003/03/02/opinion/02DOWD.html
2 http://www.zmag.org/meastwatch/gendzier-oil2.htm
2 http://www.guardian.co.uk/elsewhere/journalist/story/0,7792,785394,00.html
3 http://middleeastinfo.org/article701.html
4 http://www.freeman.org/m_online/jan97/center.htm
5 http://www.aaiusa.org/wwatch/051301.htm
6 http://www.weeklystandard.com/Content/Public/Articles/000/000/000/393rwy...
7 http://www.forward.com/issues/2003/03.03.07/news1.html
8Bush Channels Neoconservative Vision, http://www.alternet.org/story.html?StoryID=15275
9 Democracy Under Threat, http://www.zmag.org/content/print_article.cfm?itemID=2932§ionID=22
Perle's social network, as rendered by mystery technology: http://www.namebase.org/cgi-bin/nb06/04857?_PERLE_RICHARD_N

////////

Back in college I took every opportunity to get Clean Break info on the record since it was so unusual. My interview with Rashid Khalidi in the Mac Weekly 2003: From the Internet Archives: My 2003 Interview with Rashid Khalidi on Middle East politics, Iraq, Palestine, Neo-Cons & beyond | HongPong.com. [Part of this interview was actually cited & footnoted by James Bamford in 2004's "A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies." ]

DF: Noam Chomsky used the phrase ‘re-Ottomanization’ to describe the neoconservative strategy towards the Middle East, which would involve breaking down the strong states into pieces, giving them regional warlords, with Israel as the hegemonic power. Do you believe there’s merit in that viewpoint?

RK: I think that’s what some of them want to do. I’m not sure that has anything to do with US policy. That’s their fantasy. That’s really what the Clean Break strategy, if you read it very carefully, amounts to. And they’ve argued this in other places. It’s not just one document you have to go on. But to what extent that is more than the wet dreams of a bunch of neoconservatives who love Israel—love a certain muscled, hegemonic Israel—is very arguable.

I wonder about the extent to which that has any influence on US policy. I think that the idea that you crush all the strong states in the Arab world and create a situation of total instability is not something that most American policymakers accept. So, you know, maybe some of them are trying to edge crabwise towards that end, but I don’t think in the larger scheme of things it has a whole lot of influence on US policy.
  
DF: A Frontline interview with Richard Perle was published with the documentary “Truth, War and Consequences.” He talked about the Pentagon’s Office of Special Plans, which reviewed intelligence on Iraq prior to the war. Perle said the office was staffed by David Wurmser, another author of the Clean Break document. Perle says that the office “began to find links that nobody else had previously understood or recorded in a useful way.” Were the neo-cons turning their ideology into intelligence data, and putting that into the government?

RK: I can give you a short answer to that which is yes. Insofar as at least two of the key arguments that they adduced, the one having to do the connection between the Iraqi regime and al-Qaeda, and the one having to do with unconventional weapons programs in Iraq, it is clear that the links or the things they had claimed to have found were non-existent. The wish was fathered to the reality. What they wanted was what they found.

It was not just the Office of Special Plans, or whatever. There are a lot of institutions in Washington that were devoted to putting this view forward. Among them, other parts of the bureaucracy, and the vice president’s national security staff.

The vice president’s chief of staff Lewis Libby is a very important member of the neo-con group. He and the vice president have created the most powerful national security staff that anybody has ever had in the office of the vice president. I’ve read published assessments, which say that this is actually more influential than Condi Rice’s staff, the real NSC. This is another center of these views.

And then there are the think-tanks—I would use the word ‘think’ in quotes—like the American Enterprise Institute, the Heritage Foundation, the Hoover Institution and so on, all of which are devoted to spreading similar ideas. Basically any fantasy that Chalabi's people brought in, “we have a defector who says,” was turned into gold by these folks.

We now know this stuff, with a few exceptions, to be completely and utterly false, just manufactured disinformation designed to direct the United States in a certain direction. Whether the neo-cons knew this or not is another question, but I believe Chalabi’s people knew it. I would be surprised if some of them didn’t know it.

////////

“Greater Israel”: The Zionist Plan for the Middle East | Global Research (June 2014)

“Greater Israel”: The Zionist Plan for the Middle East

The Infamous "Oded Yinon Plan". Introduction by Michel Chossudovsky

By Israel Shahak - Global Research, June 13, 2014
Association of Arab-American University Graduates, Inc. 3 March 2013
Settlements israeli flag

This article was published on Global Research April 29, 2013.

Global Research Editor’s Note

The following document pertaining to the formation of “Greater Israel” constitutes the cornerstone of powerful Zionist factions within the current Netanyahu government, the Likud party, as well as within the Israeli military and intelligence establishment.

According to the founding father of Zionism Theodore Herzl, “the area of the Jewish State stretches: “From the Brook of Egypt to the Euphrates.” According to Rabbi Fischmann, “The Promised Land extends from the River of Egypt up to the Euphrates, it includes parts of Syria and Lebanon.”

When viewed in the current context, the war on Iraq, the 2006 war on Lebanon, the 2011 war on Libya, the ongoing war on Syria, not to mention the process of regime change in Egypt, must be understood in relation to the Zionist Plan for the Middle East. The latter consists in weakening and eventually fracturing neighboring Arab states as part of an Israeli expansionist project.

“Greater Israel” consists in an area extending from the Nile Valley to the Euphrates.

The Zionist project supports the Jewish settlement movement. More broadly it involves a policy of excluding Palestinians from Palestine leading to the eventual annexation of both the West Bank and Gaza to the State of Israel.

Greater Israel would create a number of proxy States. It would include parts of Lebanon, Jordan, Syria, the Sinai, as well as parts of Iraq and Saudi Arabia. (See map).

According to Mahdi Darius Nazemroaya in a 2011 Global Research article, The Yinon Plan was a continuation of Britain’s colonial design in the Middle East:

“[The Yinon plan] is an Israeli strategic plan to ensure Israeli regional superiority. It insists and stipulates that Israel must reconfigure its geo-political environment through the balkanization of the surrounding Arab states into smaller and weaker states.

Israeli strategists viewed Iraq as their biggest strategic challenge from an Arab state. This is why Iraq was outlined as the centerpiece to the balkanization of the Middle East and the Arab World. In Iraq, on the basis of the concepts of the Yinon Plan, Israeli strategists have called for the division of Iraq into a Kurdish state and two Arab states, one for Shiite Muslims and the other for Sunni Muslims. The first step towards establishing this was a war between Iraq and Iran, which the Yinon Plan discusses.

The Atlantic, in 2008, and the U.S. military’s Armed Forces Journal, in 2006, both published widely circulated maps that closely followed the outline of the Yinon Plan. Aside from a divided Iraq, which the Biden Plan also calls for, the Yinon Plan calls for a divided Lebanon, Egypt, and Syria. The partitioning of Iran, Turkey, Somalia, and Pakistan also all fall into line with these views. The Yinon Plan also calls for dissolution in North Africa and forecasts it as starting from Egypt and then spilling over into Sudan, Libya, and the rest of the region.

File:Greater israel.jpg

Greater Israel” requires the breaking up of the existing Arab states into small states.

“The plan operates on two essential premises. To survive, Israel must 1) become an imperial regional power, and 2) must effect the division of the whole area into small states by the dissolution of all existing Arab states. Small here will depend on the ethnic or sectarian composition of each state. Consequently, the Zionist hope is that sectarian-based states become Israel’s satellites and, ironically, its source of moral legitimation… This is not a new idea, nor does it surface for the first time in Zionist strategic thinking. Indeed, fragmenting all Arab states into smaller units has been a recurrent theme.” (Yinon Plan, see below)

Viewed in this context, the war on Syria is part of the process of Israeli territorial expansion. Israeli intelligence working hand in glove with the US, Turkey and NATO is directly supportive of the Al Qaeda terrorist mercenaries inside Syria.

The Zionist Project also requires the destabilization of Egypt, the creation of factional divisions within Egypt as instrumented by the “Arab Spring” leading to the formation of a sectarian based State dominated by the Muslim Brotherhood.

Michel Chossudovsky, Global Research, April 29, 2013


The Zionist Plan for the Middle East

Translated and edited by

Israel Shahak

The Israel of Theodore Herzl (1904) and of Rabbi Fischmann (1947)

In his Complete Diaries, Vol. II. p. 711, Theodore Herzl, the founder of Zionism, says that the area of the Jewish State stretches: “From the Brook of Egypt to the Euphrates.”

Rabbi Fischmann, member of the Jewish Agency for Palestine, declared in his testimony to the U.N. Special Committee of Enquiry on 9 July 1947: “The Promised Land extends from the River of Egypt up to the Euphrates, it includes parts of Syria and Lebanon.”

from

Oded Yinon’s

“A Strategy for Israel in the Nineteen Eighties”

Published by the

Association of Arab-American University Graduates, Inc.

Belmont, Massachusetts, 1982

Special Document No. 1 (ISBN 0-937694-56-8)

Table of Contents

Publisher’s Note1

The Association of Arab-American University Graduates finds it compelling to inaugurate its new publication series, Special Documents, with Oded Yinon’s article which appeared in Kivunim (Directions), the journal of the Department of Information of the World Zionist Organization. Oded Yinon is an Israeli journalist and was formerly attached to the Foreign Ministry of Israel. To our knowledge, this document is the most explicit, detailed and unambiguous statement to date of the Zionist strategy in the Middle East. Furthermore, it stands as an accurate representation of the “vision” for the entire Middle East of the presently ruling Zionist regime of Begin, Sharon and Eitan. Its importance, hence, lies not in its historical value but in the nightmare which it presents.

2

The plan operates on two essential premises. To survive, Israel must 1) become an imperial regional power, and 2) must effect the division of the whole area into small states by the dissolution of all existing Arab states. Small here will depend on the ethnic or sectarian composition of each state. Consequently, the Zionist hope is that sectarian-based states become Israel’s satellites and, ironically, its source of moral legitimation.

3

This is not a new idea, nor does it surface for the first time in Zionist strategic thinking. Indeed, fragmenting all Arab states into smaller units has been a recurrent theme. This theme has been documented on a very modest scale in the AAUG publication, Israel’s Sacred Terrorism (1980), by Livia Rokach. Based on the memoirs of Moshe Sharett, former Prime Minister of Israel, Rokach’s study documents, in convincing detail, the Zionist plan as it applies to Lebanon and as it was prepared in the mid-fifties.

4

The first massive Israeli invasion of Lebanon in 1978 bore this plan out to the minutest detail. The second and more barbaric and encompassing Israeli invasion of Lebanon on June 6, 1982, aims to effect certain parts of this plan which hopes to see not only Lebanon, but Syria and Jordan as well, in fragments. This ought to make mockery of Israeli public claims regarding their desire for a strong and independent Lebanese central government. More accurately, they want a Lebanese central government that sanctions their regional imperialist designs by signing a peace treaty with them. They also seek acquiescence in their designs by the Syrian, Iraqi, Jordanian and other Arab governments as well as by the Palestinian people. What they want and what they are planning for is not an Arab world, but a world of Arab fragments that is ready to succumb to Israeli hegemony. Hence, Oded Yinon in his essay, “A Strategy for Israel in the 1980′s,” talks about “far-reaching opportunities for the first time since 1967″ that are created by the “very stormy situation [that] surrounds Israel.”

5

The Zionist policy of displacing the Palestinians from Palestine is very much an active policy, but is pursued more forcefully in times of conflict, such as in the 1947-1948 war and in the 1967 war. An appendix entitled ”Israel Talks of a New Exodus” is included in this publication to demonstrate past Zionist dispersals of Palestinians from their homeland and to show, besides the main Zionist document we present, other Zionist planning for the de-Palestinization of Palestine.

6

It is clear from the Kivunim document, published in February, 1982, that the “far-reaching opportunities” of which Zionist strategists have been thinking are the same “opportunities” of which they are trying to convince the world and which they claim were generated by their June, 1982 invasion. It is also clear that the Palestinians were never the sole target of Zionist plans, but the priority target since their viable and independent presence as a people negates the essence of the Zionist state. Every Arab state, however, especially those with cohesive and clear nationalist directions, is a real target sooner or later.

7

Contrasted with the detailed and unambiguous Zionist strategy elucidated in this document, Arab and Palestinian strategy, unfortunately, suffers from ambiguity and incoherence. There is no indication that Arab strategists have internalized the Zionist plan in its full ramifications. Instead, they react with incredulity and shock whenever a new stage of it unfolds. This is apparent in Arab reaction, albeit muted, to the Israeli siege of Beirut. The sad fact is that as long as the Zionist strategy for the Middle East is not taken seriously Arab reaction to any future siege of other Arab capitals will be the same.

Khalil Nakhleh

July 23, 1982

Foreward

by Israel Shahak

1

The following essay represents, in my opinion, the accurate and detailed plan of the present Zionist regime (of Sharon and Eitan) for the Middle East which is based on the division of the whole area into small states, and the dissolution of all the existing Arab states. I will comment on the military aspect of this plan in a concluding note. Here I want to draw the attention of the readers to several important points:

2

1. The idea that all the Arab states should be broken down, by Israel, into small units, occurs again and again in Israeli strategic thinking. For example, Ze’ev Schiff, the military correspondent of Ha’aretz (and probably the most knowledgeable in Israel, on this topic) writes about the “best” that can happen for Israeli interests in Iraq: “The dissolution of Iraq into a Shi’ite state, a Sunni state and the separation of the Kurdish part” (Ha’aretz 6/2/1982). Actually, this aspect of the plan is very old.

3

2. The strong connection with Neo-Conservative thought in the USA is very prominent, especially in the author’s notes. But, while lip service is paid to the idea of the “defense of the West” from Soviet power, the real aim of the author, and of the present Israeli establishment is clear: To make an Imperial Israel into a world power. In other words, the aim of Sharon is to deceive the Americans after he has deceived all the rest.

4

3. It is obvious that much of the relevant data, both in the notes and in the text, is garbled or omitted, such as the financial help of the U.S. to Israel. Much of it is pure fantasy. But, the plan is not to be regarded as not influential, or as not capable of realization for a short time. The plan follows faithfully the geopolitical ideas current in Germany of 1890-1933, which were swallowed whole by Hitler and the Nazi movement, and determined their aims for East Europe. Those aims, especially the division of the existing states, were carried out in 1939-1941, and only an alliance on the global scale prevented their consolidation for a period of time.

5

The notes by the author follow the text. To avoid confusion, I did not add any notes of my own, but have put the substance of them into this foreward and the conclusion at the end. I have, however, emphasized some portions of the text.

Israel Shahak

June 13, 1982


A Strategy for Israel in the Nineteen Eighties

by Oded Yinon

This essay originally appeared in Hebrew in KIVUNIM (Directions), A Journal for Judaism and Zionism; Issue No, 14–Winter, 5742, February 1982, Editor: Yoram Beck. Editorial Committee: Eli Eyal, Yoram Beck, Amnon Hadari, Yohanan Manor, Elieser Schweid. Published by the Department of Publicity/The World Zionist Organization, Jerusalem.

1

At the outset of the nineteen eighties the State of Israel is in need of a new perspective as to its place, its aims and national targets, at home and abroad. This need has become even more vital due to a number of central processes which the country, the region and the world are undergoing. We are living today in the early stages of a new epoch in human history which is not at all similar to its predecessor, and its characteristics are totally different from what we have hitherto known. That is why we need an understanding of the central processes which typify this historical epoch on the one hand, and on the other hand we need a world outlook and an operational strategy in accordance with the new conditions. The existence, prosperity and steadfastness of the Jewish state will depend upon its ability to adopt a new framework for its domestic and foreign affairs.

2

This epoch is characterized by several traits which we can already diagnose, and which symbolize a genuine revolution in our present lifestyle. The dominant process is the breakdown of the rationalist, humanist outlook as the major cornerstone supporting the life and achievements of Western civilization since the Renaissance. The political, social and economic views which have emanated from this foundation have been based on several “truths” which are presently disappearing–for example, the view that man as an individual is the center of the universe and everything exists in order to fulfill his basic material needs. This position is being invalidated in the present when it has become clear that the amount of resources in the cosmos does not meet Man’s requirements, his economic needs or his demographic constraints. In a world in which there are four billion human beings and economic and energy resources which do not grow proportionally to meet the needs of mankind, it is unrealistic to expect to fulfill the main requirement of Western Society, 1 i.e., the wish and aspiration for boundless consumption. The view that ethics plays no part in determining the direction Man takes, but rather his material needs do–that view is becoming prevalent today as we see a world in which nearly all values are disappearing. We are losing the ability to assess the simplest things, especially when they concern the simple question of what is Good and what is Evil.

3

The vision of man’s limitless aspirations and abilities shrinks in the face of the sad facts of life, when we witness the break-up of world order around us. The view which promises liberty and freedom to mankind seems absurd in light of the sad fact that three fourths of the human race lives under totalitarian regimes. The views concerning equality and social justice have been transformed by socialism and especially by Communism into a laughing stock. There is no argument as to the truth of these two ideas, but it is clear that they have not been put into practice properly and the majority of mankind has lost the liberty, the freedom and the opportunity for equality and justice. In this nuclear world in which we are (still) living in relative peace for thirty years, the concept of peace and coexistence among nations has no meaning when a superpower like the USSR holds a military and political doctrine of the sort it has: that not only is a nuclear war possible and necessary in order to achieve the ends of Marxism, but that it is possible to survive after it, not to speak of the fact that one can be victorious in it.2

4

The essential concepts of human society, especially those of the West, are undergoing a change due to political, military and economic transformations. Thus, the nuclear and conventional might of the USSR has transformed the epoch that has just ended into the last respite before the great saga that will demolish a large part of our world in a multi-dimensional global war, in comparison with which the past world wars will have been mere child’s play. The power of nuclear as well as of conventional weapons, their quantity, their precision and quality will turn most of our world upside down within a few years, and we must align ourselves so as to face that in Israel. That is, then, the main threat to our existence and that of the Western world. 3 The war over resources in the world, the Arab monopoly on oil, and the need of the West to import most of its raw materials from the Third World, are transforming the world we know, given that one of the major aims of the USSR is to defeat the West by gaining control over the gigantic resources in the Persian Gulf and in the southern part of Africa, in which the majority of world minerals are located. We can imagine the dimensions of the global confrontation which will face us in the future.

5

The Gorshkov doctrine calls for Soviet control of the oceans and mineral rich areas of the Third World. That together with the present Soviet nuclear doctrine which holds that it is possible to manage, win and survive a nuclear war, in the course of which the West’s military might well be destroyed and its inhabitants made slaves in the service of Marxism-Leninism, is the main danger to world peace and to our own existence. Since 1967, the Soviets have transformed Clausewitz’ dictum into “War is the continuation of policy in nuclear means,” and made it the motto which guides all their policies. Already today they are busy carrying out their aims in our region and throughout the world, and the need to face them becomes the major element in our country’s security policy and of course that of the rest of the Free World. That is our major foreign challenge.4

6

The Arab Moslem world, therefore, is not the major strategic problem which we shall face in the Eighties, despite the fact that it carries the main threat against Israel, due to its growing military might. This world, with its ethnic minorities, its factions and internal crises, which is astonishingly self-destructive, as we can see in Lebanon, in non-Arab Iran and now also in Syria, is unable to deal successfully with its fundamental problems and does not therefore constitute a real threat against the State of Israel in the long run, but only in the short run where its immediate military power has great import. In the long run, this world will be unable to exist within its present framework in the areas around us without having to go through genuine revolutionary changes. The Moslem Arab World is built like a temporary house of cards put together by foreigners (France and Britain in the Nineteen Twenties), without the wishes and desires of the inhabitants having been taken into account. It was arbitrarily divided into 19 states, all made of combinations of minorites and ethnic groups which are hostile to one another, so that every Arab Moslem state nowadays faces ethnic social destruction from within, and in some a civil war is already raging. 5 Most of the Arabs, 118 million out of 170 million, live in Africa, mostly in Egypt (45 million today).

7

Apart from Egypt, all the Maghreb states are made up of a mixture of Arabs and non-Arab Berbers. In Algeria there is already a civil war raging in the Kabile mountains between the two nations in the country. Morocco and Algeria are at war with each other over Spanish Sahara, in addition to the internal struggle in each of them. Militant Islam endangers the integrity of Tunisia and Qaddafi organizes wars which are destructive from the Arab point of view, from a country which is sparsely populated and which cannot become a powerful nation. That is why he has been attempting unifications in the past with states that are more genuine, like Egypt and Syria. Sudan, the most torn apart state in the Arab Moslem world today is built upon four groups hostile to each other, an Arab Moslem Sunni minority which rules over a majority of non-Arab Africans, Pagans, and Christians. In Egypt there is a Sunni Moslem majority facing a large minority of Christians which is dominant in upper Egypt: some 7 million of them, so that even Sadat, in his speech on May 8, expressed the fear that they will want a state of their own, something like a “second” Christian Lebanon in Egypt.

8

All the Arab States east of Israel are torn apart, broken up and riddled with inner conflict even more than those of the Maghreb. Syria is fundamentally no different from Lebanon except in the strong military regime which rules it. But the real civil war taking place nowadays between the Sunni majority and the Shi’ite Alawi ruling minority (a mere 12% of the population) testifies to the severity of the domestic trouble.

9

Iraq is, once again, no different in essence from its neighbors, although its majority is Shi’ite and the ruling minority Sunni. Sixty-five percent of the population has no say in politics, in which an elite of 20 percent holds the power. In addition there is a large Kurdish minority in the north, and if it weren’t for the strength of the ruling regime, the army and the oil revenues, Iraq’s future state would be no different than that of Lebanon in the past or of Syria today. The seeds of inner conflict and civil war are apparent today already, especially after the rise of Khomeini to power in Iran, a leader whom the Shi’ites in Iraq view as their natural leader.

10

All the Gulf principalities and Saudi Arabia are built upon a delicate house of sand in which there is only oil. In Kuwait, the Kuwaitis constitute only a quarter of the population. In Bahrain, the Shi’ites are the majority but are deprived of power. In the UAE, Shi’ites are once again the majority but the Sunnis are in power. The same is true of Oman and North Yemen. Even in the Marxist South Yemen there is a sizable Shi’ite minority. In Saudi Arabia half the population is foreign, Egyptian and Yemenite, but a Saudi minority holds power.

11

Jordan is in reality Palestinian, ruled by a Trans-Jordanian Bedouin minority, but most of the army and certainly the bureaucracy is now Palestinian. As a matter of fact Amman is as Palestinian as Nablus. All of these countries have powerful armies, relatively speaking. But there is a problem there too. The Syrian army today is mostly Sunni with an Alawi officer corps, the Iraqi army Shi’ite with Sunni commanders. This has great significance in the long run, and that is why it will not be possible to retain the loyalty of the army for a long time except where it comes to the only common denominator: The hostility towards Israel, and today even that is insufficient.

12

Alongside the Arabs, split as they are, the other Moslem states share a similar predicament. Half of Iran’s population is comprised of a Persian speaking group and the other half of an ethnically Turkish group. Turkey’s population comprises a Turkish Sunni Moslem majority, some 50%, and two large minorities, 12 million Shi’ite Alawis and 6 million Sunni Kurds. In Afghanistan there are 5 million

Shi’ites who constitute one third of the population. In Sunni Pakistan there are 15 million Shi’ites who endanger the existence of that state.

13

This national ethnic minority picture extending from Morocco to India and from Somalia to Turkey points to the absence of stability and a rapid degeneration in the entire region. When this picture is added to the economic one, we see how the entire region is built like a house of cards, unable to withstand its severe problems.

14

In this giant and fractured world there are a few wealthy groups and a huge mass of poor people. Most of the Arabs have an average yearly income of 300 dollars. That is the situation in Egypt, in most of the Maghreb countries except for Libya, and in Iraq. Lebanon is torn apart and its economy is falling to pieces. It is a state in which there is no centralized power, but only 5 de facto sovereign authorities (Christian in the north, supported by the Syrians and under the rule of the Franjieh clan, in the East an area of direct Syrian conquest, in the center a Phalangist controlled Christian enclave, in the south and up to the Litani river a mostly Palestinian region controlled by the PLO and Major Haddad’s state of Christians and half a million Shi’ites). Syria is in an even graver situation and even the assistance she will obtain in the future after the unification with Libya will not be sufficient for dealing with the basic problems of existence and the maintenance of a large army. Egypt is in the worst situation: Millions are on the verge of hunger, half the labor force is unemployed, and housing is scarce in this most densely populated area of the world. Except for the army, there is not a single department operating efficiently and the state is in a permanent state of bankruptcy and depends entirely on American foreign assistance granted since the peace.6

15

In the Gulf states, Saudi Arabia, Libya and Egypt there is the largest accumulation of money and oil in the world, but those enjoying it are tiny elites who lack a wide base of support and self-confidence, something that no army can guarantee. 7 The Saudi army with all its equipment cannot defend the regime from real dangers at home or abroad, and what took place in Mecca in 1980 is only an example. A sad and very stormy situation surrounds Israel and creates challenges for it, problems, risks but also far-reaching opportunities for the first time since 1967. Chances are that opportunities missed at that time will become achievable in the Eighties to an extent and along dimensions which we cannot even imagine today.

16

The “peace” policy and the return of territories, through a dependence upon the US, precludes the realization of the new option created for us. Since 1967, all the governments of Israel have tied our national aims down to narrow political needs, on the one hand, and on the other to destructive opinions at home which neutralized our capacities both at home and abroad. Failing to take steps towards the Arab population in the new territories, acquired in the course of a war forced upon us, is the major strategic error committed by Israel on the morning after the Six Day War. We could have saved ourselves all the bitter and dangerous conflict since then if we had given Jordan to the Palestinians who live west of the Jordan river. By doing that we would have neutralized the Palestinian problem which we nowadays face, and to which we have found solutions that are really no solutions at all, such as territorial compromise or autonomy which amount, in fact, to the same thing. 8 Today, we suddenly face immense opportunities for transforming the situation thoroughly and this we must do in the coming decade, otherwise we shall not survive as a state.

17

In the course of the Nineteen Eighties, the State of Israel will have to go through far-reaching changes in its political and economic regime domestically, along with radical changes in its foreign policy, in order to stand up to the global and regional challenges of this new epoch. The loss of the Suez Canal oil fields, of the immense potential of the oil, gas and other natural resources in the Sinai peninsula which is geomorphologically identical to the rich oil-producing countries in the region, will result in an energy drain in the near future and will destroy our domestic economy: one quarter of our present GNP as well as one third of the budget is used for the purchase of oil. 9 The search for raw materials in the Negev and on the coast will not, in the near future, serve to alter that state of affairs.

18

(Regaining) the Sinai peninsula with its present and potential resources is therefore a political priority which is obstructed by the Camp David and the peace agreements. The fault for that lies of course with the present Israeli government and the governments which paved the road to the policy of territorial compromise, the Alignment governments since 1967. The Egyptians will not need to keep the peace treaty after the return of the Sinai, and they will do all they can to return to the fold of the Arab world and to the USSR in order to gain support and military assistance. American aid is guaranteed only for a short while, for the terms of the peace and the weakening of the U.S. both at home and abroad will bring about a reduction in aid. Without oil and the income from it, with the present enormous expenditure, we will not be able to get through 1982 under the present conditions and we will have to act in order to return the situation to the status quo which existed in Sinai prior to Sadat’s visit and the mistaken peace agreement signed with him in March 1979. 10

19

Israel has two major routes through which to realize this purpose, one direct and the other indirect. The direct option is the less realistic one because of the nature of the regime and government in Israel as well as the wisdom of Sadat who obtained our withdrawal from Sinai, which was, next to the war of 1973, his major achievement since he took power. Israel will not unilaterally break the treaty, neither today, nor in 1982, unless it is very hard pressed economically and politically and Egypt provides Israel with the excuse to take the Sinai back into our hands for the fourth time in our short history. What is left therefore, is the indirect option. The economic situation in Egypt, the nature of the regime and its pan-

Arab policy, will bring about a situation after April 1982 in which Israel will be forced to act directly or indirectly in order to regain control over Sinai as a strategic, economic and energy reserve for the long run. Egypt does not constitute a military strategic problem due to its internal conflicts and it could be driven back to the post 1967 war situation in no more than one day. 11

20

The myth of Egypt as the strong leader of the Arab World was demolished back in 1956 and definitely did not survive 1967, but our policy, as in the return of the Sinai, served to turn the myth into “fact.” In reality, however, Egypt’s power in proportion both to Israel alone and to the rest of the Arab World has gone down about 50 percent since 1967. Egypt is no longer the leading political power in the Arab World and is economically on the verge of a crisis. Without foreign assistance the crisis will come tomorrow. 12 In the short run, due to the return of the Sinai, Egypt will gain several advantages at our expense, but only in the short run until 1982, and that will not change the balance of power to its benefit, and will possibly bring about its downfall. Egypt, in its present domestic political picture, is already a corpse, all the more so if we take into account the growing Moslem-Christian rift. Breaking Egypt down territorially into distinct geographical regions is the political aim of Israel in the Nineteen Eighties on its Western front.

21

Egypt is divided and torn apart into many foci of authority. If Egypt falls apart, countries like Libya, Sudan or even the more distant states will not continue to exist in their present form and will join the downfall and dissolution of Egypt. The vision of a Christian Coptic State in Upper Egypt alongside a number of weak states with very localized power and without a centralized government as to date, is the key to a historical development which was only set back by the peace agreement but which seems inevitable in the long run. 13

22

The Western front, which on the surface appears more problematic, is in fact less complicated than the Eastern front, in which most of the events that make the headlines have been taking place recently. Lebanon’s total dissolution into five provinces serves as a precendent for the entire Arab world including Egypt, Syria, Iraq and the Arabian peninsula and is already following that track. The dissolution of Syria and Iraq later on into ethnically or religiously unqiue areas such as in Lebanon, is Israel’s primary target on the Eastern front in the long run, while the dissolution of the military power of those states serves as the primary short term target. Syria will fall apart, in accordance with its ethnic and religious structure, into several states such as in present day Lebanon, so that there will be a Shi’ite Alawi state along its coast, a Sunni state in the Aleppo area, another Sunni state in Damascus hostile to its northern neighbor, and the Druzes who will set up a state, maybe even in our Golan, and certainly in the Hauran and in northern Jordan. This state of affairs will be the guarantee for peace and security in the area in the long run, and that aim is already within our reach today. 14

23

Iraq, rich in oil on the one hand and internally torn on the other, is guaranteed as a candidate for Israel’s targets. Its dissolution is even more important for us than that of Syria. Iraq is stronger than Syria. In the short run it is Iraqi power which constitutes the greatest threat to Israel. An Iraqi-Iranian war will tear Iraq apart and cause its downfall at home even before it is able to organize a struggle on a wide front against us. Every kind of inter-Arab confrontation will assist us in the short run and will shorten the way to the more important aim of breaking up Iraq into denominations as in Syria and in Lebanon. In Iraq, a division into provinces along ethnic/religious lines as in Syria during Ottoman times is possible. So, three (or more) states will exist around the three major cities: Basra, Baghdad and Mosul, and Shi’ite areas in the south will separate from the Sunni and Kurdish north. It is possible that the present Iranian-Iraqi confrontation will deepen this polarization. 15

24

The entire Arabian peninsula is a natural candidate for dissolution due to internal and external pressures, and the matter is inevitable especially in Saudi Arabia. Regardless of whether its economic might based on oil remains intact or whether it is diminished in the long run, the internal rifts and breakdowns are a clear and natural development in light of the present political structure. 16

25

Jordan constitutes an immediate strategic target in the short run but not in the long run, for it does not constitute a real threat in the long run after its dissolution, the termination of the lengthy rule of King Hussein and the transfer of power to the Palestinians in the short run.

26

There is no chance that Jordan will continue to exist in its present structure for a long time, and Israel’s policy, both in war and in peace, ought to be directed at the liquidation of Jordan under the present regime and the transfer of power to the Palestinian majority. Changing the regime east of the river will also cause the termination of the problem of the territories densely populated with Arabs west of the Jordan. Whether in war or under conditions of peace, emigration from the territories and economic demographic freeze in them, are the guarantees for the coming change on both banks of the river, and we ought to be active in order to accelerate this process in the nearest future. The autonomy plan ought also to be rejected, as well as any compromise or division of the territories for, given the plans of the PLO and those of the Israeli Arabs themselves, the Shefa’amr plan of September 1980, it is not possible to go on living in this country in the present situation without separating the two nations, the Arabs to Jordan and the Jews to the areas west of the river. Genuine coexistence and peace will reign over the land only when the Arabs understand that without Jewish rule between the Jordan and the sea they will have neither existence nor security. A nation of their own and security will be theirs only in Jordan. 17

27

Within Israel the distinction between the areas of ’67 and the territories beyond them, those of ’48, has always been meaningless for Arabs and nowadays no longer has any significance for us. The problem should be seen in its entirety without any divisions as of ’67. It should be clear, under any future political situation or military constellation, that the solution of the problem of the indigenous Arabs will come only when they recognize the existence of Israel in secure borders up to the Jordan river and beyond it, as our existential need in this difficult epoch, the nuclear epoch which we shall soon enter. It is no longer possible to live with three fourths of the Jewish population on the dense shoreline which is so dangerous in a nuclear epoch.

28

Dispersal of the population is therefore a domestic strategic aim of the highest order; otherwise, we shall cease to exist within any borders. Judea, Samaria and the Galilee are our sole guarantee for national existence, and if we do not become the majority in the mountain areas, we shall not rule in the country and we shall be like the Crusaders, who lost this country which was not theirs anyhow, and in which they were foreigners to begin with. Rebalancing the country demographically, strategically and economically is the highest and most central aim today. Taking hold of the mountain watershed from Beersheba to the Upper Galilee is the national aim generated by the major strategic consideration which is settling the mountainous part of the country that is empty of Jews today. l8

29

Realizing our aims on the Eastern front depends first on the realization of this internal strategic objective. The transformation of the political and economic structure, so as to enable the realization of these strategic aims, is the key to achieving the entire change. We need to change from a centralized economy in which the government is extensively involved, to an open and free market as well as to switch from depending upon the U.S. taxpayer to developing, with our own hands, of a genuine productive economic infrastructure. If we are not able to make this change freely and voluntarily, we shall be forced into it by world developments, especially in the areas of economics, energy, and politics, and by our own growing isolation. l9

30

From a military and strategic point of view, the West led by the U.S. is unable to withstand the global pressures of the USSR throughout the world, and Israel must therefore stand alone in the Eighties, without any foreign assistance, military or economic, and this is within our capacities today, with no compromises. 20 Rapid changes in the world will also bring about a change in the condition of world Jewry to which Israel will become not only a last resort but the only existential option. We cannot assume that U.S. Jews, and the communities of Europe and Latin America will continue to exist in the present form in the future. 21

31

Our existence in this country itself is certain, and there is no force that could remove us from here either forcefully or by treachery (Sadat’s method). Despite the difficulties of the mistaken “peace” policy and the problem of the Israeli Arabs and those of the territories, we can effectively deal with these problems in the foreseeable future.

Conclusion

1

Three important points have to be clarified in order to be able to understand the significant possibilities of realization of this Zionist plan for the Middle East, and also why it had to be published.

2

The Military Background of The Plan

The military conditions of this plan have not been mentioned above, but on the many occasions where something very like it is being “explained” in closed meetings to members of the Israeli Establishment, this point is clarified. It is assumed that the Israeli military forces, in all their branches, are insufficient for the actual work of occupation of such wide territories as discussed above. In fact, even in times of intense Palestinian “unrest” on the West Bank, the forces of the Israeli Army are stretched out too much. The answer to that is the method of ruling by means of “Haddad forces” or of “Village Associations” (also known as “Village Leagues”): local forces under “leaders” completely dissociated from the population, not having even any feudal or party structure (such as the Phalangists have, for example). The “states” proposed by Yinon are “Haddadland” and “Village Associations,” and their armed forces will be, no doubt, quite similar. In addition, Israeli military superiority in such a situation will be much greater than it is even now, so that any movement of revolt will be “punished” either by mass humiliation as in the West Bank and Gaza Strip, or by bombardment and obliteration of cities, as in Lebanon now (June 1982), or by both. In order to ensure this, the plan, as explained orally, calls for the establishment of Israeli garrisons in focal places between the mini states, equipped with the necessary mobile destructive forces. In fact, we have seen something like this in Haddadland and we will almost certainly soon see the first example of this system functioning either in South Lebanon or in all Lebanon.

3

It is obvious that the above military assumptions, and the whole plan too, depend also on the Arabs continuing to be even more divided than they are now, and on the lack of any truly progressive mass movement among them. It may be that those two conditions will be removed only when the plan will be well advanced, with consequences which can not be foreseen.

4

Why it is necessary to publish this in Israel?

The reason for publication is the dual nature of the Israeli-Jewish society: A very great measure of freedom and democracy, specially for Jews, combined with expansionism and racist discrimination. In such a situation the Israeli-Jewish elite (for the masses follow the TV and Begin’s speeches) has to be persuaded. The first steps in the process of persuasion are oral, as indicated above, but a time comes in which it becomes inconvenient. Written material must be produced for the benefit of the more stupid “persuaders” and “explainers” (for example medium-rank officers, who are, usually, remarkably stupid). They then “learn it,” more or less, and preach to others. It should be remarked that Israel, and even the Yishuv from the Twenties, has always functioned in this way. I myself well remember how (before I was “in opposition”) the necessity of war with was explained to me and others a year before the 1956 war, and the necessity of conquering “the rest of Western Palestine when we will have the opportunity” was explained in the years 1965-67.

5

Why is it assumed that there is no special risk from the outside in the publication of such plans?

Such risks can come from two sources, so long as the principled opposition inside Israel is very weak (a situation which may change as a consequence of the war on Lebanon) : The Arab World, including the Palestinians, and the United States. The Arab World has shown itself so far quite incapable of a detailed and rational analysis of Israeli-Jewish society, and the Palestinians have been, on the average, no better than the rest. In such a situation, even those who are shouting about the dangers of Israeli expansionism (which are real enough) are doing this not because of factual and detailed knowledge, but because of belief in myth. A good example is the very persistent belief in the non-existent writing on the wall of the Knesset of the Biblical verse about the Nile and the Euphrates. Another example is the persistent, and completely false declarations, which were made by some of the most important Arab leaders, that the two blue stripes of the Israeli flag symbolize the Nile and the Euphrates, while in fact they are taken from the stripes of the Jewish praying shawl (Talit). The Israeli specialists assume that, on the whole, the Arabs will pay no attention to their serious discussions of the future, and the Lebanon war has proved them right. So why should they not continue with their old methods of persuading other Israelis?

6

In the United States a very similar situation exists, at least until now. The more or less serious commentators take their information about Israel, and much of their opinions about it, from two sources. The first is from articles in the “liberal” American press, written almost totally by Jewish admirers of Israel who, even if they are critical of some aspects of the Israeli state, practice loyally what Stalin used to call “the constructive criticism.” (In fact those among them who claim also to be “Anti-Stalinist” are in reality more Stalinist than Stalin, with Israel being their god which has not yet failed). In the framework of such critical worship it must be assumed that Israel has always “good intentions” and only “makes mistakes,” and therefore such a plan would not be a matter for discussion–exactly as the Biblical genocides committed by Jews are not mentioned. The other source of information, The Jerusalem Post, has similar policies. So long, therefore, as the situation exists in which Israel is really a “closed society” to the rest of the world, because the world wants to close its eyes, the publication and even the beginning of the realization of such a plan is realistic and feasible.

Israel Shahak

June 17, 1982 Jerusalem

About the Translator

Israel Shahak is a professor of organic chemistly at Hebrew University in Jerusalem and the chairman of the Israeli League for Human and Civil Rights. He published The Shahak Papers, collections of key articles from the Hebrew press, and is the author of numerous articles and books, among them Non-Jew in the Jewish State. His latest book is Israel’s Global Role: Weapons for Repression, published by the AAUG in 1982. Israel Shahak: (1933-2001)

Notes

1. American Universities Field Staff. Report No.33, 1979. According to this research, the population of the world will be 6 billion in the year 2000. Today’s world population can be broken down as follows: China, 958 million; India, 635 million; USSR, 261 million; U.S., 218 million Indonesia, 140 million; Brazil and Japan, 110 million each. According to the figures of the U.N. Population Fund for 1980, there will be, in 2000, 50 cities with a population of over 5 million each. The population ofthp;Third World will then be 80% of the world population. According to Justin Blackwelder, U.S. Census Office chief, the world population will not reach 6 billion because of hunger.

2. Soviet nuclear policy has been well summarized by two American Sovietologists: Joseph D. Douglas and Amoretta M. Hoeber, Soviet Strategy for Nuclear War, (Stanford, Ca., Hoover Inst. Press, 1979). In the Soviet Union tens and hundreds of articles and books are published each year which detail the Soviet doctrine for nuclear war and there is a great deal of documentation translated into English and published by the U.S. Air Force,including USAF: Marxism-Leninism on War and the Army: The Soviet View, Moscow, 1972; USAF: The Armed Forces of the Soviet State. Moscow, 1975, by Marshal A. Grechko. The basic Soviet approach to the matter is presented in the book by Marshal Sokolovski published in 1962 in Moscow: Marshal V. D. Sokolovski, Military Strategy, Soviet Doctrine and Concepts(New York, Praeger, 1963).

3. A picture of Soviet intentions in various areas of the world can be drawn from the book by Douglas and Hoeber, ibid. For additional material see: Michael Morgan, “USSR’s Minerals as Strategic Weapon in the Future,” Defense and Foreign Affairs, Washington, D.C., Dec. 1979.

4. Admiral of the Fleet Sergei Gorshkov, Sea Power and the State, London, 1979. Morgan, loc. cit. General George S. Brown (USAF) C-JCS, Statement to the Congress on the Defense Posture of the United States For Fiscal Year 1979, p. 103; National Security Council, Review of Non-Fuel Mineral Policy, (Washington, D.C. 1979,); Drew Middleton, The New York Times, (9/15/79); Time, 9/21/80.

5. Elie Kedourie, “The End of the Ottoman Empire,” Journal of Contemporary History, Vol. 3, No.4, 1968.

6. Al-Thawra, Syria 12/20/79, Al-Ahram,12/30/79, Al Ba’ath, Syria, 5/6/79. 55% of the Arabs are 20 years old and younger, 70% of the Arabs live in Africa, 55% of the Arabs under 15 are unemployed, 33% live in urban areas, Oded Yinon, “Egypt’s Population Problem,” The Jerusalem Quarterly, No. 15, Spring 1980.

7. E. Kanovsky, “Arab Haves and Have Nots,” The Jerusalem Quarterly, No.1, Fall 1976, Al Ba’ath, Syria, 5/6/79.

8. In his book, former Prime Minister Yitzhak Rabin said that the Israeli government is in fact responsible for the design of American policy in the Middle East, after June ’67, because of its own indecisiveness as to the future of the territories and the inconsistency in its positions since it established the background for Resolution 242 and certainly twelve years later for the Camp David agreements and the peace treaty with Egypt. According to Rabin, on June 19, 1967, President Johnson sent a letter to Prime Minister Eshkol in which he did not mention anything about withdrawal from the new territories but exactly on the same day the government resolved to return territories in exchange for peace. After the Arab resolutions in Khartoum (9/1/67) the government altered its position but contrary to its decision of June 19, did not notify the U.S. of the alteration and the U.S. continued to support 242 in the Security Council on the basis of its earlier understanding that Israel is prepared to return territories. At that point it was already too late to change the U.S. position and Israel’s policy. From here the way was opened to peace agreements on the basis of 242 as was later agreed upon in Camp David. See Yitzhak Rabin. Pinkas Sherut, (Ma’ariv 1979) pp. 226-227.

9. Foreign and Defense Committee Chairman Prof. Moshe Arens argued in an interview (Ma ‘ariv,10/3/80) that the Israeli government failed to prepare an economic plan before the Camp David agreements and was itself surprised by the cost of the agreements, although already during the negotiations it was possible to calculate the heavy price and the serious error involved in not having prepared the economic grounds for peace.

The former Minister of Treasury, Mr. Yigal Holwitz, stated that if it were not for the withdrawal from the oil fields, Israel would have a positive balance of payments (9/17/80). That same person said two years earlier that the government of Israel (from which he withdrew) had placed a noose around his neck. He was referring to the Camp David agreements (Ha’aretz, 11/3/78). In the course of the whole peace negotiations neither an expert nor an economics advisor was consulted, and the Prime Minister himself, who lacks knowledge and expertise in economics, in a mistaken initiative, asked the U.S. to give us a loan rather than a grant, due to his wish to maintain our respect and the respect of the U.S. towards us. See Ha’aretz1/5/79. Jerusalem Post, 9/7/79. Prof Asaf Razin, formerly a senior consultant in the Treasury, strongly criticized the conduct of the negotiations; Ha’aretz, 5/5/79. Ma’ariv, 9/7/79. As to matters concerning the oil fields and Israel’s energy crisis, see the interview with Mr. Eitan Eisenberg, a government advisor on these matters, Ma’arive Weekly, 12/12/78. The Energy Minister, who personally signed the Camp David agreements and the evacuation of Sdeh Alma, has since emphasized the seriousness of our condition from the point of view of oil supplies more than once…see Yediot Ahronot, 7/20/79. Energy Minister Modai even admitted that the government did not consult him at all on the subject of oil during the Camp David and Blair House negotiations. Ha’aretz, 8/22/79.

10. Many sources report on the growth of the armaments budget in Egypt and on intentions to give the army preference in a peace epoch budget over domestic needs for which a peace was allegedly obtained. See former Prime Minister Mamduh Salam in an interview 12/18/77, Treasury Minister Abd El Sayeh in an interview 7/25/78, and the paper Al Akhbar, 12/2/78 which clearly stressed that the military budget will receive first priority, despite the peace. This is what former Prime Minister Mustafa Khalil has stated in his cabinet’s programmatic document which was presented to Parliament, 11/25/78. See English translation, ICA, FBIS, Nov. 27. 1978, pp. D 1-10.

According to these sources, Egypt’s military budget increased by 10% between fiscal 1977 and 1978, and the process still goes on. A Saudi source divulged that the Egyptians plan to increase their militmy budget by 100% in the next two years; Ha’aretz, 2/12/79 and Jerusalem Post, 1/14/79.

11. Most of the economic estimates threw doubt on Egypt’s ability to reconstruct its economy by 1982. See Economic Intelligence Unit, 1978 Supplement, “The Arab Republic of Egypt”; E. Kanovsky, “Recent Economic Developments in the Middle East,” Occasional Papers, The Shiloah Institution, June 1977; Kanovsky, “The Egyptian Economy Since the Mid-Sixties, The Micro Sectors,” Occasional Papers, June 1978; Robert McNamara, President of World Bank, as reported in Times, London, 1/24/78.

12. See the comparison made by the researeh of the Institute for Strategic Studies in London, and research camed out in the Center for Strategic Studies of Tel Aviv University, as well as the research by the British scientist, Denis Champlin, Military Review, Nov. 1979, ISS: The Military Balance 1979-1980, CSS; Security Arrangements in Sinai…by Brig. Gen. (Res.) A Shalev, No. 3.0 CSS; The Military Balance and the Military Options after the Peace Treaty with Egypt, by Brig. Gen. (Res.) Y. Raviv, No.4, Dec. 1978, as well as many press reports including El Hawadeth, London, 3/7/80; El Watan El Arabi, Paris, 12/14/79.

13. As for religious ferment in Egypt and the relations between Copts and Moslems see the series of articles published in the Kuwaiti paper, El Qabas, 9/15/80. The English author Irene Beeson reports on the rift between Moslems and Copts, see: Irene Beeson, Guardian, London, 6/24/80, and Desmond Stewart, Middle East Internmational, London 6/6/80. For other reports see Pamela Ann Smith, Guardian, London, 12/24/79; The Christian Science Monitor 12/27/79 as well as Al Dustour, London, 10/15/79; El Kefah El Arabi, 10/15/79.

14. Arab Press Service, Beirut, 8/6-13/80. The New Republic, 8/16/80, Der Spiegel as cited by Ha’aretz, 3/21/80, and 4/30-5/5/80; The Economist, 3/22/80; Robert Fisk, Times, London, 3/26/80; Ellsworth Jones, Sunday Times, 3/30/80.

15. J.P. Peroncell Hugoz, Le Monde, Paris 4/28/80; Dr. Abbas Kelidar, Middle East Review, Summer 1979;

Conflict Studies, ISS, July 1975; Andreas Kolschitter, Der Zeit, (Ha’aretz, 9/21/79) Economist Foreign Report, 10/10/79, Afro-Asian Affairs, London, July 1979.

16. Arnold Hottinger, “The Rich Arab States in Trouble,” The New York Review of Books, 5/15/80; Arab Press Service, Beirut, 6/25-7/2/80; U.S. News and World Report, 11/5/79 as well as El Ahram, 11/9/79; El Nahar El Arabi Wal Duwali, Paris 9/7/79; El Hawadeth, 11/9/79; David Hakham, Monthly Review, IDF, Jan.-Feb. 79.

17. As for Jordan’s policies and problems see El Nahar El Arabi Wal Duwali, 4/30/79, 7/2/79; Prof. Elie Kedouri, Ma’ariv 6/8/79; Prof. Tanter, Davar 7/12/79; A. Safdi, Jerusalem Post, 5/31/79; El Watan El Arabi 11/28/79; El Qabas, 11/19/79. As for PLO positions see: The resolutions of the Fatah Fourth Congress, Damascus, August 1980. The Shefa’amr program of the Israeli Arabs was published in Ha’aretz, 9/24/80, and by Arab Press Report 6/18/80. For facts and figures on immigration of Arabs to Jordan, see Amos Ben Vered, Ha’aretz, 2/16/77; Yossef Zuriel, Ma’ariv 1/12/80. As to the PLO’s position towards Israel see Shlomo Gazit, Monthly Review; July 1980; Hani El Hasan in an interview, Al Rai Al’Am, Kuwait 4/15/80; Avi Plaskov, “The Palestinian Problem,” Survival, ISS, London Jan. Feb. 78; David Gutrnann, “The Palestinian Myth,” Commentary, Oct. 75; Bernard Lewis, “The Palestinians and the PLO,” Commentary Jan. 75; Monday Morning, Beirut, 8/18-21/80; Journal of Palestine Studies, Winter 1980.

18. Prof. Yuval Neeman, “Samaria–The Basis for Israel’s Security,” Ma’arakhot 272-273, May/June 1980; Ya’akov Hasdai, “Peace, the Way and the Right to Know,” Dvar Hashavua, 2/23/80. Aharon Yariv, “Strategic Depth–An Israeli Perspective,” Ma’arakhot 270-271, October 1979; Yitzhak Rabin, “Israel’s Defense Problems in the Eighties,” Ma’arakhot October 1979.

19. Ezra Zohar, In the Regime’s Pliers (Shikmona, 1974); Motti Heinrich, Do We have a Chance Israel, Truth Versus Legend (Reshafim, 1981).

20. Henry Kissinger, “The Lessons of the Past,” The Washington Review Vol 1, Jan. 1978; Arthur Ross, “OPEC’s Challenge to the West,” The Washington Quarterly, Winter, 1980; Walter Levy, “Oil and the Decline of the West,” Foreign Affairs, Summer 1980; Special Report–”Our Armed Forees-Ready or Not?” U.S. News and World Report 10/10/77; Stanley Hoffman, “Reflections on the Present Danger,” The New York Review of Books 3/6/80; Time 4/3/80; Leopold Lavedez “The illusions of SALT” Commentary Sept. 79; Norman Podhoretz, “The Present Danger,” Commentary March 1980; Robert Tucker, “Oil and American Power Six Years Later,” Commentary Sept. 1979; Norman Podhoretz, “The Abandonment of Israel,” Commentary July 1976; Elie Kedourie, “Misreading the Middle East,” Commentary July 1979.

21. According to figures published by Ya’akov Karoz, Yediot Ahronot, 10/17/80, the sum total of anti-Semitic incidents recorded in the world in 1979 was double the amount recorded in 1978. In Germany, France, and Britain the number of anti-Semitic incidents was many times greater in that year. In the U.S. as well there has been a sharp increase in anti-Semitic incidents which were reported in that article. For the new anti-Semitism, see L. Talmon, “The New Anti-Semitism,” The New Republic, 9/18/1976; Barbara Tuchman, “They poisoned the Wells,” Newsweek 2/3/75.

///////

Transcript of interview: Full post from ISIS: The Bombshell Interview to Impeach Obama by Arabi Souri:

The author found some difficulties in finding a proper title for this post, which is based on a TV interview with the founder of Jihadist movement in Egypt and a former top Al-Qaeda commander. Each line of the interview is a title by itself, each piece of information is more than enough to put tens of western officials and their regional stooges behind bars for long times, those who are acting as the Humanitarian Bastards crying for the suffering of the innocent they only inflicted their suffering.

Finally, I decided to post the text of the interview as it is without my usual adding in noting how the western citizens are played by their governments, so I’ll leave you with the interview conducted by pan Arab Al-Maydeen TV with Sheikh Nabeel Naiem, who was introduced by the TV presenter as: ‘the former founder of Jihad Organization & expert in Islamist groups’, enjoy:

The interview text:

- With us here in the studio Sheikh Nabeel Naim former founder of Jihad Organization & expert in Islamist groups, welcome..

Noting that you were in Afghanistan with Osama Bin Laden & Dr. Ayman Zawahri, in accommodation and also in prison with Dr. Ayman Zawahri, can we say now you retired from Al-Qaeda?

Nabeel Naiem: Not really, they are the ones who deviated, we went there to fight the Soviet invasion of Afghanistan, and there was almost a unanimous agreement among Islamic clerics that time on that (Jihad against Soviets), and after that they deviated and turned their activities against Islamic and Arabic countries, and they committed the prohibited which is killing Muslims, and at the same time after the death of Osama Bin Laden, Al-Qaeda turned into a mercenary (group)..

- You are one of the founders of Jihad in Egypt, and you were at the beginning times of Al-Qaeda so to speak, can a member of that rank distance himself from Al-Qaeda, leave the organization? Will the organization leave him? Some say it is not accepted in the ideology of the organization..

Nabeel Naiem: No, the organization deviated, they became Takfiris, they are killing Muslims.. Am I fighting Jihad (holy war) to go to hell or seeking heaven?!

What is the cause of Jihad? (whoever kills a believer intentionally – his recompense is Hell, wherein he will abide eternally, and Allah has become angry with him and has cursed him and has prepared for him a great punishment) [Quran 4:93]

- Did they call you a Kafir (non-believer) now?

Nabeel Naiem: The high ranks, like Ayman, no they did not, but the small lads they’re the ones who consider me Kafir.

- The natural question one would ask: Why wouldn’t some who consider you Kafir try to assassinate you?

Nabeel Naiem: No, I’m a legend.. I have a history those same boys are astonished with my history, and they wonder why I changed, I was the cloud above those boys..

I was a solid warrior and I fought and have a horrible history whether inside Egypt or outside it, I’m not just a lad, or someone who just joined, I was everything in the organization..

- I mean now after the Takfiri ideology (labeling people as Kuffar – non-believers) why nobody tried to liquidate you with this Takfiri ideology?

Nabeel Naiem: This is with God’s grace upon me, and then I have a history.. When they get to know my history.. none of them have achieved the history I did.

- Back to the questions I understand you’re telling me the main structure of Al-Qaeda does not exist anymore.. Are we
talking now about schism? Can we say that (Daesh) ISIS is part of Al-Qaeda?

Nabeel Naiem: No, the old commanders have left the whole organization, only Ayman is left and around him a few we call them mentally retarded or crazy, Takfiri people.. But all the founders have left, some died and the others just left..

As for ISIS, it follows the ideology of Al-Qaeda organization, which was found by Sayyed Imam Sherif and put it in his book Al Jamei Fi Talab Al-ilm Al Sharif (Bible of Seeking Honorable Learning), & it’s one of the most dangerous books circulated in the world, and it’s translated to all languages by the way, Kurdish, Urdu, Persian, Turkish.. etc.

- You say that ISIS is a branch of Al-Qaeda?

Nabeel Naiem: It adopts the ideology of Al-Qaeda. ISIS was established in 2006, we created Al-Qaeda since 1989.

- Explain to me now the position of Dr. Ayman Zawahri from ISIS and Abu Bakr Baghdadi (head of ISIS), what do they consider him?

Nabeel Naiem: He (Zawahri) asked Abu Bakr Baghdadi to pledge allegiance to him (as the Emir..) but Abu Bakr Baghdadi, since he’s basically a U.S. agent, told him: we are the people of cause, the cause of liberating Iraq, Syria and so.. You’re the one who should pledge allegiance to us, Ayman (Zawahri) refused so there was a dispute and a fight between them.

- How he is an American agent? Explain to us how?

Nabeel Naiem: It is known that the USA released him from prison and he spent 20 to 30 million US Dollars to establish these ISIS groups and the first ISIS camps were established in Jordan, and Jordan doesn’t allow camps for charity, when Jordan establish camps to train terrorist groups, it doesn’t do that out of good will and charity, these camps were supervised by the Marines, and the arming of ISIS is all American.. and how do they arrange their expenses? I was in charge of a camp for 120 men, we were spending thousands of thousands (of dollars).. food, drinks, weapons, munition, training..

- Excuse me, you’re talking about ISIS? You were in charge of an ISIS camp?

Nabeel Naiem: No, I am telling you I was once in charge of a camp of 120 men and we were spending that time thousands (of Dollars), imagine how much this ISIS is spending?! Let me tell you something.. The wounded from ISIS during (terrorist) operations, are they being treated here in Lebanon? No, neither in Syria, nor in Saudi nor in Egypt, where do they go? They go to Israel. Now as we speak there are 1,500 of ISIS & Nusra (Front) are in Tel Aviv hospitals.

- From where this information?

Nabeel Naiem: Where are their wounded? Don’t they have wounded? Where are they being treated? This is well known..

- They have field hospitals, and it’s remarkable that they have a number of doctors in their ranks, even doctors from
European countries..

Nabeel Naiem: Yes, the field doctor would only give first aid until you reach the hospital.

- You mentioned an important point about financing, I read for your a lot actually when at the beginning of Al-Qaeda when talking about Osama Bin Laden you were talking about self-financing..

Nabeel Naiem: Osama was spending by himself, but before Osama there was the International Islamic Relief Organization and the connection between us and them was Dr. Abdulla Azzam, then we had some issues with Adbulla Azzam so he cut off from us the money and expenses so we replaced him with Osama Bin Laden, and the brothers in Al-Qaeda, mainly from the GCC countries called him Emir of Arabs.

- You just mentioned that 120 members required thousands, we are talking about a structure spread worldwide, could this be understood in the context of self-financing reaching ISIS today? I’ll read what the British Independent Newspaper said, it reveals there are a number of donors from Saudi who played an essential role in establishing Jihadist groups since over 30 years, that’s why I ask you about the beginnings as you were there then.. It’s a CIA report and it’s after September 11 attacks and it suggests Al-Qaeda had relied on middlemen who collected money from Saudi & other GCC donors..

Nabeel Naiem: This is ‘crap’ what the Independent says, these are foolish people, a fool journalist who doesn’t know what to say. First of all, the donations of GCC citizens to the Jihadist groups in Afghanistan was known and done publicly and it was advertised in newspapers and on TV, what this Independent guy adding?

I’m one of the people who took more than a thousand free air tickets from the International Islamic Relief Organization

- Please explain what are you aiming at with the International Islamic Relief Org.?

Nabeel Naiem: It was paying our expenses while we were in the Afghani Jihad, bring weapons, ammunition, training, food, drinks.. all of this we were getting from the Islamic Relief Org.. they were spending..

- This is what I meant, Islamic Relief Org. is specialized in collecting Zakat (charity) and it’s in Saudi (Arabia)..

Nabeel Naiem: These are fools.. Prince Sulaiman Bin Abdul Aziz was in charge of it, it was not running loose you grab what you want and go on.. It was Saudi Intelligence and Prince Sulaiman Bin Abdul Aziz was in charge of it, it wasn’t a loose charity you fill your pockets and walk, No.

Secondly, there was a hospital called Kuwaiti Crescent Hospital, it had 250 beds, it had all kinds of operations, and it had doctors employed there, money (budget), medicine, used to spend millions, it was under Kuwaiti (Red) Crescent.

So what new this Independent is telling? USA itself was supporting Hikmatyar, Who brought Stinger missiles to the Afghani Mujahideen? The missiles which badly hurt the USSR? It was brought by the USA..

- This is the point you mentioned when talking about Al-Qaeda, USA supported Al-Qaeda because it was fighting Russia, today when we come closer to this region, who supports who in favor of who? ISIS works for who?

Nabeel Naiem: Look, there’s nothing constant in these matters, take for example after Russia was defeated (in Afghanistan) the Americans wanted to get rid of the Arab Afghanis, and in fact the Arab Afghanis were arrested, deported and some like us were jailed, so Al-Qaeda in Afghanistan was struck by September 11 attacks and after Osama Bin Laden’s death Al-Qaeda was bought by the Qatari Intelligence, and I tell you during the International Conference of Ikhwan (Muslim Brotherhood) in Istanbul, Qatar decided to create a fund to sponsor Free Egyptian Army and paid 1 billion dollar for it, and the person in charge of this fund is Ali Kurrah Zadah, Muslim Brotherhood official in Turkey, this is the finance, not like someone says 1 sheikh is donating..!

- This is one side, what’s important to know is what ISIS wants from Iraq? Is it the issue of borders? The borders strategy? Borders war? But this ideology is trans-borders it seems, how did ISIS expand from Syria into Iraq? What does it want exactly from Iraq?

Nabeel Naiem: No dear, ISIS started in Iraq, and Ibrahim Abu Bakr Baghdadi is Iraqi (national), and after that they were given camps to train in Jordan and they smuggled into Syria from Jordan and they were defeated in Syria then they moved back into Iraq once again.

As to what’s happening in Iraq, it’s bigger than ISIS, Mosul city has 4 million residents & it’s second largest province, in Iraq there’s a problem between the Arabs in Anbar and (Prime Minister) Maliki, and ‘Maliki Army’ who handed over their weapons had Shiite commanders, so nobody would argue ISIS and Shiites, those commanders handed over their weapons to Arab tribes but ISIS is in the headlines.

ISIS has something called Management of Savagery, a book titled Management of Savagery..

- We have shown some details about this book on our channel..

Nabeel Naiem: Abu Bakr Muhammad Maqdisi in this book has taken the same policy of Genghis Khan, thanks God they didn’t claim they derived their policies from prophet Muhammad, because God said: ‘There has certainly been for you in the Messenger of Allah an excellent pattern for anyone whose hope is in Allah and the Last Day and [who] remembers Allah often.’ [Quran 33:21].. So their ‘excellent pattern’ was Genghis Khan.

Genghis Khan used to enter a village and annihilates all living in it, even animals he’d slaughter it, and burn down the houses, so the next village hears that Genghis Khan is coming they flee away and this is what ISIS is doing in Iraq, and what’s the goal of ISIS? When ISIS entered Samerra they killed a thousand Sunni, and now killing Shiites, and this is the American policy.

Henry Kissinger wrote a memo in 1982 or 1984, don’t remember exactly, it’s titled The 100 Years War. When asked where this 100 years war will occur? He said in the Middle East when we ignite the war between the Sunnah and the Shiites.

So they’re working on igniting the war between the Sunna and the Shiites, just like what Abu Mussab (Zarqawi) used to blow up Sunnah mosques then blow up Shiite mosques, to start the sectarian war in the region; and this is of course an American plot, and I tell you ISIS didn’t kill a single American.

ISIS didn’t behead a single American and didn’t play football with his head, they beheaded Muslims and ate livers of Muslims and didn’t kill a single American though it’s established since 2006..

- You’re talking about ISIS’s brutality and ideology but it finds popularity among the youth.. and popularity among many sides and it practices the highest level of violence and brutality, can you explain to us what makes all these groups with all its diversities to join this organization?

Nabeel Naiem: It’s the Takfiri ideology, the problem with this Takfiri ideology it’s widely spread among the European Muslims, why?

I sat with them.. The European Muslims denounced everything they saw in Europe..

- But they also come from GCC countries and Islamic countries even..

Nabeel Naiem: I’m with you, it’s spread among the Muslims in Europe and it’s spread in Saudi because Wahhabism is the closest to Takfir than others. And when I sat with them I found out they have a single-sided Takfiri thinking, like when I spoke with Sayyed Imam in the judgment against the ruler’s assistants, where he said there’s no ruler who can rule by himself, he must have the support of the police and army thus the police & army are all also Kuffar (infidels) like him, so I asked what about who goes to the polls to elect the ruler? He replied: He’s a Kafir (infidel).

I told him: you have labeled the Army, police and the people as Kuffar (infidels), you’re a Takfiri..

The religion (Islam) is not so strict, it includes prevention excuses like ignorance, circumstances, causes.. they didn’t study all this, for them the ruler is an infidel that means all of those with him are infidels.. Bashar (Assad) is a Nusairi then all of those with him are Nusairis, although that the Syrian Army 90% of it is Sunni, because that’s the Sunni percentage of Syrians.

But they are one-sided thinking and they’re ignorant..

- Ignorant in what sense?

Nabeel Naiem: Ignorant of the religion (Islam). I was living with Ayman (Zawahri), Ayman is ignorant, he wasn’t saying anything without consulting me first..

- In spite that you mentioned that Ayman Zawahri was refusing at one stage of time to accept the Takfiris (in Al-Qaeda)..

Nabeel Naiem: Yes, we were the ones who didn’t allow them. I told him: If your brother Muhammad joins the organization we will dissolve it because your brother is Takfiri. So he agreed until we entered jail and we’re separated, his brother came in and took over the whole organization, and his brother is retarded actually, he’s Takfiri and retarded, if you talk with him you feel you’re talking with someone who is brainless..

- That’s what’s strange as I mentioned we’re talking about different segments of societies from different countries and even from different education levels, we see PHD holders, how do you call all of these ignorant?

Nabeel Naiem: Ignorance in religion is something and being a doctor is something else.. I’ll give you an example. If I’m a doctor in a clinic, and with me is a nurse, and for 30 years he will be with me, will he become a doctor after 30 years?

Will this nurse become a doctor after 30 years being a nurse?

- This is as a description, right?

Nabeel Naiem: They’re like this, they educate themselves by themselves, they’re like the nurses, they’ll never become doctors. I am specialized in Islamic Sharia, for me he’s ignorant, ignorant in the religion, he doesn’t understand the religion.

- We should explain, you’re talking about Jihad? Salafist Jihad or Takfiris? These are the segments?

Nabeel Naiem: Yes, they’re ignorant..

- All of them?

Nabeel Naiem: I argued with their top sheikh (cleric) – Salafists, Salafist Jihadist and Takfiris, these are 3 different samples, all of them are ignorant?

They’re not different they’re all ignorant, I was living with Sayyed Imam Sharif, he’s the international founder of the whole ideology spread in the region from Jakarta to Nouakchott (in Mauritania), he wrote them a book titled ‘Al Jamei Fi Talab Al-ilm Al-Sharif (Bible in Seeking Honorable Learning), this book is the manifest and ideology of all the Takfiri groups like ISIS, Nusra Front, Ansar Bet Maqdas (Jerusalem House Supporters), Salafist Jihadist, and all of those you can imagine, and nobody wrote after the book of Sayyed Imam (Sharif).

I debated with Sayyed Imam and debated with him about a lot of matters, he told me in the next edition of the book he will rectify & mention the comments I said, he didn’t, he re-issued the book as it is.

I also argued with someone a Takfiri just for sins, a sin is infidelity, like the one committing adultery doesn’t do so and he’s a believer thus he’s a Kafir (infidel), so I argued with him: the punishment for the believer who becomes a disbeliever (leaves Islam) is death, and the adulterer’s punishment is flogging, how does the punishment differ (when committing a sin only)?

The differ in ideology and thinking is long since the beginnings, after Osama Bin Laden (era) between (Ayman) Zawahri & (Abu Bakr) Maqdisi, which resulted in the schism among other organizations, but when we talk now about ISIS, if we compare them with Al-Qaeda, there’s an essential difference between them..

There’s no difference in ideology, only organizational difference..

- Then what is the future of ISIS based on?

Nabeel Naiem: As long as the youth are convinced with the Takfir ideology, ISIS will continue.

Secondly, ISIS is playing on 2 levels: Bashar Assad (Syrian president) is a Nusairi infidel & should be fought, and they use the Fatwas (religious judicial opinion) of Ibn Taymiyyah in regards with the Nusairi sect..

- Depending on feeding these thoughts will ensure its continuity, and maybe other interests..

Nabeel Naiem: And oil.. All sorts of feeding: intellectual, money, gears, munition, all of that.. As long as there are sources feeding this ideology ISIS will continue..

Bernard Lewis founder of Fourth-Generation Warfare said so, he said: we do not need trans-continent armies that would awake nationalism and they return to us as bodies like what happened in Afghanistan & Vietnam, but we should find agents inside the (targeted) country who will carry out the task of the soldiers, and we need a media tool to falsify truths for the people, and money to spend on them..

This is the Fourth-Generation Warfare, agents instead of soldiers..

- This is an alternative army, a war by proxy?

Nabeel Naiem: Yes of course.

- Between who (this war)? We are talking about armies on the ground, Al Qaeda and all what branches out of it, these armies work for the account of which battle and between who?

Nabeel Naiem: It works for the US Intelligence (CIA).

- Who it fights?

Nabeel Naiem: The regimes, they put a plan in 1998 called Clean Break (PNAC)..

- In Iraq, who is it fighting? Is it fighting Nouri Maliki (Iraqi PM)?

Nabeel Naiem: It fights both Sunnah and Shiites, when they entered Sammerra, Sheikh Ali Hatimi, head of Anbar Tribes said: ISIS entered Sammerra and killed a thousand Sunni in cold blood.. and it kills Shiites and kills Christians and kills whoever it faces, ISIS considers all people infidels and their bloods are free.

Who killed Imam Ali appropriated his blood, who slaughtered Hussein wasn’t he a Muslim and from a sect claims they’re Islamist?

All these have a shameless historic extension, the prophet PBuH called them Dogs of Hell, the prophet said: ‘if I meet them I will kill them the same killing of ‘Aad and Iram of the Pillars’, those are the ones behind these ideologies, the ideologies of Khawarij (outlaws in Islam) who the prophet warned of them, and these will continue, as for ISIS, ISIS did not kill a single American. The opposition fighting Bashar Al-Assad fiercefully for 3 years did not shoot a single bullet against Israel..

- What makes the close enemy, so to speak, in the ideology of these groups, the close enemy is these countries and its leaders, geographically speaking, this term as close enemy and far enemy exists in Al-Qaeda, you mentioned Israel which is not far geographically, what makes it far for them?

Nabeel Naiem: No, they don’t say this, they say: fighting an apostate is a more priority than fighting the original infidel, close and far that’s an old saying.. The apostate is us now..

- As per their understanding?

Nabeel Naiem: Yes, we are apostate, the Arab rulers are apostate, the Arab armies are apostate, thus fighting the apostate is a priority over fighting the original infidel, the Jew.

For instance, Issam Hattito, head of Muslim Brotherhood responsible for leading the battles against Bashar Assad, where does he reside? Is he in Beirut? Riyadh or Cairo? He’s residing in Tel Aviv.

Ahmad Jarba, does he stay in Riyadh, Cairo or Tehran? He’s moving between New York, Paris and London, his employers, who pay his expenses..

When Obama was exposed and it was learned that he’s arming ISIS and Nusra Front with American and Turkish weapons said: ‘We will stop the arming because the American weaposn were leaked to Nusra..’ Didn’t Obama say that?

Leaked?! You discovered it was leaked after 2 years war?!

Nusra Front fighters are 10,000 and ISIS fighters are another 10,000, all 20,000 fighters using American weapons, and Obama claims after 2 years he discovers his (American) weapons are leaked to them?! Are you thinking we are fools?

Muslim Brotherhood

When Obama Raised the Muslim Brotherhood (cartoon from Syrianews.cc)

This is a conspiracy against the region, and I told you Netenyahu & Dick Chenney put the Clean Break plan in the year 1998, and it’s destroying 4 countries, they start with Iraq, then Syria then Egypt then Saudi Arabia. It’s called Clean Break plan (PNAC), well known.. Using radical groups in the region.

The legal case (former Egyptian president) Mohammad Morsi is being tried for, the case of communicating (with the enemy) and contacting Ayman Zawahri was an assignment of Issam Haddad by Obama in person on 28 December 2012, he was at the White House in a meeting with the CIA, he says in his confessions when interrogated by the public prosecution in the case..

- How did you get it?

Nabeel Naiem: These public prosecution confessions are published and are available.. Obama entered (the meeting room) and gave the CIA team a paper and left, they read it and told him: it’s required by the Muslim Brotherhood to contain the radical groups in the region starting with Hamas & Al-Qaeda, so he called Ayman Zawahri through Rifa’a Tahtawi, head of presidential court, who happens to be Ayman’s cousin from Rifa’a Tahtawi’s phone.

Ayman (Zawahri) talking to Mohammad Morsi and Morsi says to him: Peace be Upon You Emir (Prince) of Believers, we need your people here in Sinai, and I will provide them with expenses, food and water and prevent security from pursuing them..

This was recorded and sent to the public prosecutor and this is what Mohammad Morsi is being tried for.

If you ask how I got to know this? I was in Channel 2 of Egyptian TV, and with me was General Gamal, 1st secretary of Egyptian Intelligence, who recorded the call and written it down and based on it the memo was written and handed to the Public Prosecutor.

The TV presenter asked him: Is it allowed for the Intelligence Services to tap the telephone of the president of the republic?

He replied: I’m not tapping the president’s phone, I was tapping Ayman’s (Zawahri) phone and found the president talking to him, telling him Peace be Upon You Emir of Believers, so I wrote down the tape, wrote a report and submitted to the head of intelligence..

She asked him: Did you inform the president? He replied: It’s not my job, I do not deal with the president (directly), I deal with the head of intelligence and that’s my limits.

She asked him: What did you write in your investigations and your own report, what did you write after you wrote down the tape (contents)?

I swear to God he told her, & I was in the same studio,: I wrote that Mr. Mohammad Morsi Ayyat president of the republic is a danger for Egypt’s National Security.

So the ignorant should know why the army stood by the side of the people on 30 June, because the president is dealing with Al-Qaeda organization, and it’s recorded, and he’s being on trial for it now, and head of intelligence wrote that the president of the republic is a danger on Egypt’s National Security.

This is the task of these groups in the region. When Obama said he supported Morsi’s campaign with 50 million (Dollars), and when (Yousuf) Qaradawi said: Obama sent us 60 million Dollars for the Syrian ‘Resistance’, God bless you Obama, and we need more..

Did Obama convert to Islam or America became a Hijabi (wore a burqa, veil)?

I ask Qaradawi: When Obama supports the Syrian opposition, is it to establish the Caliphate? And return the days of the Rashideen Caliphates? Or Obama converted to Islam or America became a Hijabi to support the Syrian opposition?

This is the work of agents (spies), exposed and debunked, and we don’t want to fool ourselves and hide our heads in the sand, the region is under a conspiracy and it’s to drag Iran to a war of attrition..

The first statement ISIS announced after the fight with Maliki it said: ‘We will head to Najaf & Karballa and destroy the sacred shrines’, they dragged the legs of Iran (into Iraq).

Iran said they’ll defend the sacred shrines, it has to, it cannot (not defend them), this is what’s required,

It’s required to clash Saudi and Iran in the 100 years war, an endless war, it exhausts Saudi resources and its monies, and it exhausts Iran resources and its monies, like what they did during the days of Saddam in Iraq (with Iran). This is what we should understand, fight and stand against..

- You mentioned Egypt, Syria and Iraq, we see in all of it similar activities, and you also mentioned Saudi, is it in a coming phase Saudi will be targeted?

Nabeel Naiem: It was meant when Muslim Brotherhood lay their ground in ruling Egypt, problems would start in Saudi in 2016 and in the whole Gulf (GCC), this is not my words, this what the head of national security in United Arab Emirates Dhahi Khalfan said, he arrested those who confessed.

From where did Dhahi Khalfan get this? They arrested cells which confessed in details: If Muslim Brotherhood settles in Egypt, they’ll start exporting problems to the Gulf (GCC) through their existing cells, and destabilize the security of the Gulf, and this is what Dhahi Khalfan, head of national security in UAE said, not what I say.

- The circumstances and factors we saw in Cairo, Damascus and Baghdad, in the countries: Syria, Egypt and Iraq, there was a security vacuum and repercussions of so called Arab Spring, what vacuum we are talking about in Saudi Arabia? Where to find the circumstances and factors that would allow these organizations to enter the (Saudi) kingdom? Opening gaps? Where?

Nabeel Naiem: Look, they have a book being circulated in London titled The Rule of Al Saud, in this book they called the Saudi family as Kuffar (infidels), and that it is unjust, and it steals the monies of the Saudis, and it’s an infidel doesn’t rule by God’s commands, and only applies Sharia law on the weak while the strong and the princess no law being applied on them, a book to educate the Saudi youths abroad to fight a war against the Saudi government, they also say: we call on the kingdom to become a constitutional monarchy, ie. the king doesn’t rule, like the British queen, and this trend is being supported by America and Britain and the people working on this are residing in London, the nest of spies, all the spies of the world reside in London..

Their goal is to divide the region in order to achieve Israel’s security.

Israel is a weak and despicable state, by the way, geopolitical, Israel is not a state, like Qatar, is Qatar a state? Qatar is only a tent and a man sitting it with his money and that’s it..

There are countries like Iran, Saudi and Egypt, in geography it exists until the end of times, and there are countries called the Satanic Shrubs, it’s just found you don’t know how, like Israel and Qatar, it can vanish in one day and you won’t find it..

So for Israel to guarantee its existence, all the surrounding entities around it should be shredded.. Kurds to take one piece, Sunnah take one piece, Maliki takes one piece.. each sect has their own piece just like Lebanon they keep fighting between each other, once they finish beating each other they drink tea then go for a second round beating each other..

- I want to get back to the factors in regards with the Saudi Kingdom, you mentioned what is planned for based on this ideology, and you know better, you have experience and you talk about examples and evidences, but how they will enter?

True there was a statement by the Saudi ministry of interior in last May claiming they dismantled a cell that follows ISIS of 62 members, as they stated, but how they’ll enter (Saudi), what are the factors they’ll be depending on to enter?

Nabeel Naiem: I’m telling you they are preparing for the revolution against the ruling family, that it’s a corrupt family, this family steals the money of the Saudis, talks about the roots of the family..

- From inside the kingdom?

Nabeel Naiem: From inside the kingdom, and there are strong Takfiri members inside the kingdom, because as you know the difference beteween Wahhabi and Takfiri ideologies is as thin as a single hair, thus there are a lot of youths who follow this (Takfiri) ideology, add to it the feeding against the kingdom and its government and against the ruling family, it’s very easy for him to blow himself up with anything..

- So it will be only based on these factors, we don’t want to disregard an important point that groups of the ISIS are from the Gulf countries, and there are reports that the (governments of GCC) are turning a blind eye away from recruiting a number of them and sending them to fight in Syria and in a number of other countries including Iraq, as per these reports, could there be recruiting to use inside the kingdom? To move inside the kingdom?

Nabeel Naiem: Yes, yes, most are Saudis & the move will be like that but they were hoping for the Muslim Brotherhood government in Egypt to settle in power, that’s why when (Saudi) king Abdallah supported the 30 June revolution (in Egypt), he did so based on the information he has of what will happen in the region

Why did he stand against the Muslim Brotherhood? Saudi was always containing the MBs, and if the MBs (Muslim Brotherhood) ever made money, it was from Saudi, and Mohammad Qotb, the father of all Takfir in the world, spent 40 years of his life in Saudi, he wrote a book called The Ignorance in the Twentieth Century, and he claims we’re living in an ignorance more than the one in the days of the prophet PBuH, and Saudi hosted him and he was teaching in the university.. What made them go against them (MBs)?

Because the Muslim Brotherhood have no religion, no nation, not safe to be with them, they’ll betray anyone.

- On the other hand, how to deal with such an organization and such an ideology?

Nabeel Naiem: The voices of the Islamic moderation very low, throaty, so to speak..

- We do not hear that loud voice who would stand against them, is it not convincing? Or need mediums?

Nabeel Naiem: No, the sapien voice doesn’t have a vim, they’re employees, they’d say let ISIS burn out with who brought it..

It doesn’t have the vim to respond, doesn’t feel the danger, secondly, Azhar in Egypt, which was leading the movement of religious enlightenment, is absented for the past 40 years, the reason for its absent for 40 years is the oil boom, and the voices of the Saudi clergy becoming higher than the Azhar clergy. Salafism was found in Egypt just to fight Azhar (Islamic University), then, the scholars duty is to respond to the ideology of ISIS, detail it and respond to it, scholars should come and say this is what ISIS is saying and the right respond is this.. and I sat with people who came from London to fight in Syria, they sat with me and thanks to God they went from Egypt back to London.

They came to ask me, and I told them, let’s assume that Bashar (Assad) died in the morning, would I be saying: Why God did you take Bashar while the war is not over yet? Who will replace Bashar?

They replied: (Ahmad) Jarba..

I said: Jarba is worth of Bashar shoes only.. They said: true. And they went back.

I told them you are going to fight in favor of America and Israel, will you be the one to rule Syria?

If you were the one who will rule Syria I will come and fight on your side, I swear by God I’ll come and fight on your side..

But are you going to rule Syria after Bashar? He said no, I told him you are being used to remove Bashar and then Jarba, Salim Idress, Issam Hattito will come, all of those are being raised in the spy nest in London, it’s not you who will rule.

- How can we differentiate between religious commitment and the national responsibility? Is there a problem in combining both?

Nabeel Naiem: Yes, yes, of course, there is a strong fault between the national responsibility and the religious commitment. I’ll tell you what the General Guide (leader) of (Muslim) Brotherhood said? He said Toz (B.S.) with Egypt. This is their vision of the national responsibility.

And when the MBs ruled Egypt.. I’ll give you one evidence for their despise to the nation (Egypt), in the last interview done by the Consular Adli Mansour, the interim president of Egypt with Mrs. Lamis Hadidi, the last question she asked him was about the background picture of the map of Egypt behind him, she asked him to tell her the story about this picture behind him..

He said: this picture was done by King Fouad a 100 years ago, we know that first was King Fouad, then King Farouq then Abdul Nasser, Sadat then Mubarak. He told her since King Fouad did this photo a 100 years ago and it’s hanged there, it was removed for 1 year only, when the Muslim Brotherhood ruled Egypt. They removed it and put in the stores..

And they were working on a plot to concede 600 square kilometers to Hamas to resolve the Palestinian cause..

There is a link between the national responsibility and the religious commitment, and this contradicts with the understanding of the Salafists clerics, and I’ll tell you the political theory of imam Ibn Taymiyyah, who people consider him the most strict imam, Ibn Taymiyyah was asked: if the nation’s interest conflicts with applying Sharia, if we apply Sharia will lose the country, what to do?

He said: Maintaining the homeland is a priority over applying Sharia, because if you lose the country, where will you apply Sharia?

I’ll give you an example to make it clearer, if someone is naked and will fall from the 10th floor, will you rescue him or get him something to wear?

Thus, to preserve the country is more important than to apply Sharia if there’s interest conflict.

- And the interest now?

Nabeel Naiem: To preserve the nation.

- And in fact this is the most absented side between the politics, we called the national responsibility and..

Nabeel Naiem: This is because of ignorance, not knowing what’s the national responsibility, there’s no conflict between national responsibility and religious commitment, it’s because those are ignorants the conflict is happening between the nation and the belief.

- This topic needs more discussing, especially in regards with the relations with regional countries, western countries, in regards with the nature of these countries, its backgrounds and its beliefs, we see relations are allowed with India and China, and when we talk about countries like Iran then the religious backgrounds are mentioned and this also might require further research if possible we can get a comment from you on it?

Nabeel Naiem: What I want to tell you, the efforts of all Islamic countries, Sunnah and Shiites, must combine, to eradicate these groups, because these groups are the claws of colonialism in the region, it’s not on religious bases, there are members of ISIS who do not pray, so in Al-Qaeda, there are members who didn’t pray a single kneeling, there must be a combination of the countries efforts to organically eliminate these groups by security and by intellect, disprove their ideology..

There must be a response to these groups and explaining its ideology is a stray ideology, contrary to the Islamic Sharia, and this is the ideology that the prophet warned from when he said about Khawarij (Outlaws in Islam):

‘Newly in the religion, ribald in their aims, they go through the religion like how an arrow goes through the bow, if I meet them I will kill them the way Iram and A’ad were killed, they’re the worse killers under the skies, blessed who they kill or who kills of them..’ and he called them: ‘the dogs of hell.’

- Thank you a lot sheikh Nabil Naiem, our guest here in the studio, founder of Jihad Organization formerly, and expert in the Islamist groups. – end of interview.

Yours truly kept saying: ‘They fool you, they keep fooling you and they enjoy fooling you, not because they’re smart, but because you’re foolable‘, so I repeat it once again.

////////

Anyway that is the Clean Break, Yinon Plan and an interview with a high-level Jihadi imprisoned for 20 years. While there is plenty more to research about the Middle East, these particular information points still seem as relevant as ever.

Also, who has been using that "Peace through strength" phrase lately? Sigh: Rand Paul: My Foreign Policy Is the Same as Reagan's Peace Through Strength.

Palestinians' Light Rail Intifada or "Shufat Revolution"? North Jerusalem Shufat light rail damaged, Pisgat Ze'ev settlement transport topology

grinder-shufat.jpg

Geopolitical Flashpoint Pisgat Zeev & Shufat - Jerusalem neighborhoods with Separation Wall & Grindable Light Rail too [photo source: Twitter / Majd_AzaaaL: من شعفاط الشبان …]

pisgat-zeev-shufat.jpg

Photo Source (Reuters/Baz Ratner) - Palestinian officials condemn Israel settlement plans | Maan News Agency Nov 6 2012: "The Israel Land Administration on Monday published notices inviting bids from contractors to build on plots in Ramot and Pisgat Zeev, urban settlements that Israel has declared part of Jerusalem. The plans call for the building of 607 new homes in Pisgat Zeev and 606 in Ramot. Tens of thousands of Israelis already live in the two areas."

screen-shot-2014-07-04-at-10-42-42-pm.pngA light rail built recently in metropolitan Jerusalem has been damaged at several points in intense protests sweeping much of the West Bank and Arab-Israeli cities like Nazareth. Apparent reprisal killings, attacks & marches against Palestinians after three Jewish settler teenagers were killed in the West Bank has left the region in upheaval. With renewed instability across much of "Al-Sham", an area comprising Israel, Palestine, Syria, Lebanon, Iraq, Jordan, this season there's renewed focus on individual communities & networks battling each other. [Photo source at right Israel Police / Jpost: Palestinian unrest spreads to Israeli-Arab towns in fresh riots | JPost | Israel News July 5 2:42PM update]

Shufat / Shuafat & Pisgat Ze'ev, and their shared light rail network, form a critical geopolitical fault line in recent days: Murdered teen laid to rest, as tensions flare in Shufat | Mondoweiss. Israeli police mass along lightrail pathway:

201407060417.jpg

In the complex topologies of Middle Eastern conflict railroads are an interesting one as depicted in Lawrence of Arabia. British and Ottoman railroad power provided leverage in previous eras. Kemal Mustafa Ataturk got a large rail network rolling in Turkey, then it suffered from neglect for decades due to US imposing pro-auto industry policies on the Turkish government.

The metropolitan Jerusalem government built a light rail system through Shufat [wiki], a north Jerusalem Arab neighborhood which is within the area Israel captured in 1967 and annexed, offering its residents Israeli citizenship. Most decline IL citizenship and have Israeli residency cards, including those in the Shufat refugee camp which has families from nearby areas that landed there in the Nakba / Israel's founding.

More recently Shufat has been shoved into a lonely status as an Israeli-annexed city but partially outside the Separation Wall around much of Jerusalem, making it harder for Shufat residents to work in neighboring recently built Jewish settlements inside the area now demarcated as metropolitan Jerusalem. Even though they are within Israel as Israel defines it, & not like West Bank towns, they are still totally screwed by most of the same problems facing nearby Palestinian West Bank towns.

Those who see the light rail system as part of the occupation settler apparatus supported disabling it. Pisgat Zeev, built in 1985, is served on the line. For many years the neoliberal settler goal was to develop commuter suburbs in the occupied West Bank laced with settler-only road systems, setting up Jewish suburbs among old Arab towns where, unfortunately no area resident was part of the same national government. [Sometimes it happens one apartment at a time].

The current situation has led Hamas in Gaza to call on Palestinians to join "Shufat Revolution": Hamas calls on Palestinians to join 'Shufat revolution' | Al Bawaba. AFP July 3 photo:

000_Nic6345610.jpg

Hamas called Thursday upon all Palestinians to engage in “the revolution of Shufat” with every possible tool in their power to aid the resistance.

Hamas said in a statement that “our people in occupied Jerusalem started a huge revolution against the Israeli occupation and settlers.”

Fawzi Barhoum said that “the revolution of Shufat” and its intifada show that all the violations, suppression and intimidation “cannot keep the Palestinians down” but only makes them hold onto their rights and resist.

March 19 2014: Israel approves 184 new settlement homes | Reuters

(Reuters) - Israel's Jerusalem municipality approved building plans on Wednesday for 184 new homes in two Jewish settlements in the occupied West Bank, drawing anger from Palestinians engaged in faltering statehood talks. A municipality spokeswoman said the local planning committee had approved requests by private contractors who purchased the land years ago for the construction of 144 homes in Har Homa and 40 dwellings in Pisgat Zeev.

shufat-openstreetmap.png

OpenStreetMap | Relation: ‪שועפת / شعفاط /Shoufat‬ (‪2746781‬) - Open Street Map entry for Shoufat light rail station. Things start to make more sense when juxtaposed with latest additions to Pisgat Zeev & notice how Shuafat refugee camp is actually cut off from rest of Shuafat by the Separation Barrier: Right click to view this full-res map separately via PeaceNow.org.il.

copy-of-pisgat-zeev-plans.jpg

via Pisgat Zeev in the Headlines – What does it mean? | Eyes On The Ground in East Jerusalem. The light rail seems to service within 1km some of the latest plans for new Israeli construction. Via MondoWeiss: Israeli riot police possibly along light rail corridor (Photo: Matthew Vickery)

DSC_3049.jpg

From rightwing Arutz Sheva:Documentation of Jerusalem's Destroyed Light Rail - Inside Israel - News - Arutz Sheva

img66802.jpg

img66813.jpg

Peace now mapping from 2010: Facts on the Ground map project - Americans for Peace Now

pisgat-zeev.png

The rail system has not been without controversy: Haaretz Aug 23 2010: Officials slam 'racist' Jerusalem light rail survey Israel News | Haaretz

shuafat-lightrail.jpg

Municipal officials slammed the company that won the Jerusalem light rail tender for publishing a survey asking city residents whether it would bother them if Palestinians were to use the system under various conditions.

Officials from the municipality and the Transportation Ministry called the questions "racist," and said they should not have been asked, especially not by a private company.

Last week, Haaretz reported that the CityPass consortium had asked Jerusalem residents, "There are three stops in Shuafat; does this bother you?" and "All passengers, Jews and Arabs, can enter the train freely, without undergoing a security check. Does this bother you?"

Municipal director general Yair Maayan sent a strongly worded letter to Avraham Shohat, CityPass' chairman, on Friday. The letter was titled, "Request for an examination and for drawing conclusions."

"We were flabbergasted to see how a private commercial consortium dared to address these subjects, which are none of its business whatsoever; to ask such racist questions and to arouse strife and contention in the city," said the letter, citing the Haaretz article.

"It is a shame that the municipal director general attributed totally unfounded significance to the survey, whose only aim was to improve the service to all the residents," said the spokesman. "This merely adds unnecessary fuel to the fire and certainly does not serve the interests of the city's residents. The survey was not meant to offend any residents, and we shall change it accordingly."

////

Some other headlines from around the spectrum on latest developments:

Slaying of Palestinian teen stokes fear of new intifada - chicagotribune.com [Batsheva Sobelman July 2]

Search for missing settlers shines light on depth of the West Bank’s occupation | Al Akhbar English

MAP: SETTLEMENT EXPANSION EAST JERUSALEM, 2010-2013 — Foundation for Middle East Peace

SETTLEMENT-RELATED INCIDENTS IN THE WEST BANK, 2011-2013 — Foundation for Middle East Peace

Settlement related incidents WB 2011-13.PNG

/////

Video shows faces of suspected killers of Palestinian teen | The Electronic Intifada

Former Shin Bet security chief blasts deceptive regime: Diskin: Delusional government brought us to this security deterioration - Israel News, Ynetnews

The escalation of violence in the territories, Jerusalem and the triangle (of Arab towns in central Israel) are the direct result of the policies of the government of Prime Minister Benjamin Netanyahu, former Shin Bet chief Yuval Diskin wrote late Friday in a harshly critical Facebook post.

In his lengthy comment, Diskin wrote that the rapid deterioration in the security situation has shattered the Israeli leadership's "illusion that Israel's frustrated Arab citizens will not at the end of the day take to the streets over the lack of response to their problems and the containment of the Palestinians in the West Bank, and will not react despite their frustration and the worsening economic situation."

This illusion, Diskin said, "worked perfectly for as long as the defense establishment succeeded in providing impressive calm in the defense arena. The rapid deterioration in the security situation was not only down to the brutal murders of Naftali, Eyal and Gil-Ad, but first and foremost it is the result of the illusion that the government's stagnation in every area was really keeping the situation in deep freeze."

Diskin, who headed the Shin Bet for six years, went on to define the various "illusions" that he says the government is propagating.

"The illusion that 'price tag' attacks are just a few slogans on the walls and not really racism; the illusion that everything can be solved with a little more force; the illusion that the Palestinians will just accept all that we are doing in the West Bank and not respond, despite their rage, frustration and worsening economic situation; the illusion that the international community will not impose sanctions on us; that Israel's frustrated Arab citizens will not ultimately take to the streets over the lack of treatment of their problems; and the Israeli public will keep submissively accepting the government's incompetent response to the social gaps that its policies have only worsened, when corruption continues to eat away at all that is good, and so on and so on."

Diskin concluded with a grave warning that there could still be worse to come.

"Anyone who thinks that this can be sustained is making a huge mistake. What has been happening in recent days could be much worse - even if the situation temporarily calms down. Do not be fooled for one moment, because the massive internal pressure will still be there, the combustible fumes in the air will not dissipate, and if we do not dispel them, there will be an even more serious situation."

///////

VIDEO: Palestinian journalist gets clobbered apparently by fireworks: ‫فضائية فلسطين اليوم‬

VIDEO: Shuafat light rail station damage: LiveLeak.com - The Shuafat Jerusalem Light Rail Station Final Destruction by Palestinian Youth Aftermath. July 02,2014

Bitter rightwing account showing how Netanyahu govt manipulated press blackout around kidnappings to alter flow of popular outrage in Israel: Blog: Zalmi Unsdorfer, Bibi is the Price Tag - Arutz Sheva

VIDEO: Israeli Jews militant chants in angry nighttime march - Jules Farah - "FUCK ARABS"; "DEATH TO ARABS"; "ARABS GO TO GAZA"

Paywall: Police arrests 20 protesters as riots spread to Arab towns // As violence rears its head, could Netanyahu's government be next casualty? - Diplomacy and Defense Israel News | Haaretz

Bulldoze the Jewish terrorists’ homes - Opinion Israel News | Haaretz [paywalld]

The tragedy of the innocent boys murdered by terrorists will haunt us for a long time, but it will not destroy us. Jewish revenge killings will.

By Rabbi Daniel Landes | 12:35 04.07.14 |

There is only one sane and truly halakhic way to tackle our current situation: Take the well-known members of the Orthodox Price Tag gang and lock ‘em up, for a long time and in an inaccessible prison. Don’t let them go home for chagim and deny them visitors. Do the best to break and separate them. Freeze monies that go to their families. And when and if we have proven guilty perpetrators, bulldoze their…

In United States weird topology news, police cut off a street in Cincinnatti claiming too many sex workers… We ain't TRICKIN', Open up MCMICKEN - The Petition Site

Network Map from SethFranzman.com:

screen-shot-2014-07-04-at-10-43-42-pm.pngSeveral posts on likely trouble with this line: The rise and fall of Jerusalem’s light rail | Seth J. Frantzman // Rightwingers spinning it's some BDS / ISM sabotage conspiracy because why would regular working Palestinians want to sabotage a line serving new settlements? The Light Rail Destruction is More than Meets the Eye - Op-Eds - Arutz Sheva [Arutz Sheva / Israel National News is a pro settler service. Also: Riots in Shuafat: Light Rail Station Set on Fire - Latest News Briefs - Arutz Sheva] Similar: The Jewish Press » » Terrorist Attacks on Light Rail in Jerusalem

Refugee camp history: Shu’fat Refugee Camp | Grassroots Al-Quds Network

July 3: Israel Moves Troops Toward Gaza As Tensions Soar - AP JOSEF FEDERMAN

July 5 WaPo: In Jerusalem neighborhood, an unlikely center of Palestinian grievance - The Washington Post

More settlement construction maps: march 21 2014: Monitoring Israeli Colonization Activities in the Palestinian Territories

//////

Transportation can be a powerful force for colonialism -- it's not hard to see why it's a matter of profound importance for Palestinians to try to express some influence on the weird, militarized Jerusalem development environment by cutting off a mass transit system designed to serve ongoing 'frontier' settlements isolating them from the West Bank. The topology of the conflict continues….

Backstories & Backbones; Security of US Emergency Alert System (EAS) is crap & spoof zombie apocalypses not very difficult apparently; #OpNSA NSA PRISM tunnel servers may be getting noticed; Joe Naccio & NSA revisited

Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/

Much of this is old news but why not batch some of it in one place?

On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….

Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)

Emergency Alert System Fail: Also covered in ars technica. See this video's crazy audio message for hacked Montana Emergency Alert System clip from this February: http://gawker.com/5983516/montana-tv-stations-emergency-alert-system-hac...

So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.

Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.

/////

http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in...

Press contact:
Craig Brophy
Global PR Manager, IOActive, Inc.
E: PR@ioactive.com
T: +1 206 462 2291

Press Release

IOActive Uncovers Vulnerabilities in United States Emergency Alerting System

Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack

Seattle, WA July 8, 2013IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.

IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.

“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”

The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.

IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.

About IOActive
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.

////////////

http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02

Advisory (ICSA-13-184-02)

Monroe Electronics DASDEC Compromised Root SSH Key

Original release date: July 03, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.

Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

The following Monroe Electronics products are affected:

  • DASDEC-I
  • DASDEC-II

IMPACT

An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.

The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

COMPROMISED ROOT SSH KEYhttp://cwe.mitre.org/data/definitions/321.html, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotea_ixegenr" name="footnoterefa_ixegenr">a

DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.

CVE-2013-0137http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0137, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoteb_ya73jua" name="footnoterefb_ya73jua">b has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotec_6n5eegx" name="footnoterefc_6n5eegx">c

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a moderate skill level could exploit this vulnerability.

MITIGATION

Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting support@digitalalertsystems.com.

ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.

///////////

http://www.kb.cert.org/vuls/id/662676

Vulnerability Note VU#662676

Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key

Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013

Overview

Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.

Description

The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.

Compromised root SSH key (CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.

Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.

Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.

Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.

Default password
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.

Impact

An attacker with the private key and SSH access can log in to a device with root privileges.

Predictable session IDs could allow an attacker to take control of an existing administrative web session.

Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.

Logs may disclose configuration information that can benefit an attacker.

Solution

Apply an update

On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.

DASDEC users can obtain updated firmware and release notes by contacting <support@digitalalertsystems.com>. R189 One-Net users can contact <eas@monroe-electronics.com>.

Disable compromised SSH key

The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.

Manually inspect SSH keys

To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:

$ ssh-keygen -l -f authorized_keys2.dasdec
1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)

Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:

To generate new SSH keys, use ssh-kegen.

Restrict access

If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.

Change default passwords

Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.

/////

#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?

#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!

statement here:

Twitter: http://www.twitter.com/op_nsa

IRC: https://webchat.anonops.com/?channels…

Transcript below:

Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

This one is interesting, I don't know why anyone would trust any VPN in particular tho :/

/////

http://pastebin.com/BzN9aUkq By: luminary on Jun 29th, 2013 | OpNSA VPN services.

Want to defeat PRISM?

Do you like the idea of free internet usage?

Well here is a list of Virtual Private Network providers recommended by Anonymous.

These services claim explicitly in their Terms of Service that they don't keep connection

logs on their customers, though it's always best to do some SERIOUS digging into a company's

history before you commit your freedom.

If you don't plan on doing anything illegal and you're merely trying to avoid snoopers

or circumvent censorship, free VPNs will likely suffice, but if you're going for a more

shady flavor of activism, don't leave home without these.

All of these accept Bitcoin, so that's a very helpful attribute. Bitcoin is a highly secure

payment method used if you don't want people to know who you are when you buy things over the internet.

BTGuard VPN

Private Internet Access VPN

Air VPN

PRQ VPN

Mullvad VPN

///////

http://pastebin.com/TpGTHDSy By: luminary on Jul 7th, 2013 | syntax: None | size: 2.45 KB | hits: 2,365 | expires: Never

PRETENTIOUS MINIATURE PRESS RELEASE:

Greetings, National "Security" Agency -- and our followers whom we love so much:

This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.

SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:

ns3-194.akamaiedge.net 56923 IN A 23.61.199.194

lar7.akamaiedge.net 64613 IN A 222.122.64.131

la11.akamaiedge.net 90000 IN A 213.254.238.131

lac1.akamaiedge.net 90000 IN A 193.108.88.1

la6.akamaiedge.net 70352 IN A 96.7.50.192

ns6-194.akamaiedge.net 90000 IN A 95.100.168.194

ns7-194.akamaiedge.net 90000 IN A 96.7.49.194

lar2.akamaiedge.net 84886 IN A 2.16.40.192

la1.akamaiedge.net 53942 IN A 184.26.161.192

lar6.akamaiedge.net 54809 IN A 195.59.44.137

la7.akamaiedge.net 39448 IN A 96.17.144.197

ns5-194.akamaiedge.net 35282 IN A 184.85.248.194

la3.akamaiedge.net 39672 IN A 96.7.251.131

Acquired by:

Restless

R00tsh3ll - @r00tsh3ll1 (twitter)

Intro Written and Info PASTED by:

Luminary - @aluminary (twitter)

PS:

There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^

//////

http://pastebin.com/X3siNZRC By: luminary on Jul 8th, 2013 | syntax: None | size: 3.64 KB | hits: 120 | expires: Never

Tor Tutorial

By: @aluminary

Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.

It can be downloaded from here: https://www.torproject.org/

For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.

Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.

Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.

Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.

Stay Anonymous. Stay safe.

Keep it up and defeat PRISM. Together, we are strong.

Together, we are Legion.

Twitter: https://twitter.com/op_nsa

IRC: webchat.anonops.com

channel: #opnsa.

^^You cannot use Tor with webchat. J/s

/////////////

Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.

A recent tor security example, you would need to keep javascript shut off to be safer from this, as but one example http://tedjonesweb.blogspot.com/2013/06/torbroker-security-vulnerability...

Another recent discussion http://seclists.org/fulldisclosure/2013/Jul/31

"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me. Trust tor. I will not run dsniff or tcpdump. Its save. I will never abuse the logins you gave me for free. Afk now, that one guy is surfing on xhamster, nice video choice" -- "Alex"

Lol well put I suppose. Concise anyway.

Good tor network data source http://torstatus.blutmagie.de/

Router name agentAdrianLamo is doing well lol http://torstatus.blutmagie.de/router_detail.php?FP=ba7385668e2386246f2fb...

Tor vuln paper http://www.syverson.org/tor-vulnerabilities-iccs.pdf

http://www.blackhatlibrary.net/Tor

also for listserv activity https://lists.torproject.org/pipermail/tor-censorship-events/

Tor activity very much logged by NSA as shown recently http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-...

Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 141.101.120.67 & 141.101.120.66

//////

For more on the Op_NSA situation check out

https://twitter.com/Op_NSA

https://twitter.com/aluminary

https://twitter.com/dickfacerax

///////

Email encryption in general:

For basics of encrypting email see Riseup.net: https://help.riseup.net/en/encrypting-email-with-thunderbird

Cryptome.org has had interesting stuff about PGP keys lately as well! http://cryptome.org/2013/07/mining-pgp-keyservers.htm & many posts on PGP keys registered to assorted federal departments! 2013-0744.htm 2013-0746.htm 2013-0741.htm etc

///////

More backstories and Backbones:

Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:

Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001

On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.

These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):

The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).

MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY

In the IG report these aforementioned companies at listed at Company A, B, and C.

There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.

See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)

The project and procurement code as: DXXXXX01XXXXX

The program office as listed at:

2011 CRYSTAL DRIVE STE 911 (One Crystal Park Bldg "Crystal City 2" see also: http://cryptome.org/rummy-op2.htm)
ARLINGTON , VA , 22202-3732
USA

19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.

Using a DUNS# of 790238638

The persons name under whom this was all listed is:

GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
(202) 483-8707

At the same address is:
Hope L Biglow

Grafton Bigelow is also listed at various addresses in:
414 Second
Cape May, NJ and West Cape May, NJ
(609) 884-4346

Plus several addresses in:
Hyattsville, MD
West Palm Beach, FL

But, the name Grafton Biglow also turns up:

FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov

Curious coincidence.

Hopefully he had his own phone checked for bugs.

Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"

Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.

The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.

The President of the United State is just a fucking moron, and utter and complete moron.

--- FUCK THE PIGS ---

-jma

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111


Presidents-Spy-Program-Sept14-2001.pdf (342pp, 679KB)

/////////

The NSA Naccio Qwest case!

So there have been interesting developments. This bit about the contract hookups reminds me of Qwest's former CEO Joseph Naccio.

Here is what Naccio filed while fighting charges -- unlike virtually every white collar weasel ever, he ultimately got convicted of insider trading, no doubt with only the finest SIGINT available. Redacted PDF :: http://www.wired.com/images_blogs/threatlevel/files/512.pdf

http://www.denverpost.com/breakingnews/ci_22918125/former-qwest-ceo-joe-nacchio-moved-halfway-house - April 2013 he is getting out of jail soon with enormous fines as well. Many posts at Denver Post.

Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.

Lucrative secret contracts indeedly doodley.

http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm 5-11-2006

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. ...

... the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government.

//////

Oct 15 2007: WSJ story: http://webcache.googleusercontent.com/search?q=cache:http://online.wsj.com/article/SB119240248793758652.html

Nacchio Alleges Reprisal

Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA

By

DIONNE SEARCEY

and

EVAN PEREZ

Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.

Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.

Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.

A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.

The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.

The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.

Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.

Write to Dionne Searcey at dionne.searcey@wsj.com and Evan Perez at evan.perez@wsj.com

///////////

The Daily Caller is trying to get this narrative bounced again: http://dailycaller.com/2013/06/13/jailed-qwest-ceo-claimed-that-nsa-retaliated-because-he-wouldnt-participate-in-spy-program/

CBS news in 2009: http://www.cbsnews.com/2100-250_162-1616326.html

Naccio's argument was not allowed in open court. Of course that Denver judge also had the NSA all over his phone too I would hazard to guess.

But who cares what the NSA does to judge's phones anyway? (see NSA whistleblower Russ Tice specifying NSA space asset surveillance vs Justice Alito for example)

Don't forget Israel re NSA contractors: read up on James Bamford on Israeli contractors & the NSA: http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ . A few salient snippets on the pervasive role of the spinoff companies of Israel's NSA equivalent, Unit 8200:

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

Anyway that's enough stuff for now. Figure better to get a hard reference of it for those interested!

TRAILBLAZERs unite! Q2 & Turnkey Dictatorship, the Great Game of All the Internets & Jewel vs NSA: warrantless wiretapping lawsuit moves forward with William Binney, Thomas Drake & J. Kirk Wiebe

NSA-restructure-workstations-windows.png
TRAILBLAZER related NSA workstation privatization schema in FOUO document --- SOURCE WayneMadsenReport.com - http://www.waynemadsenreport.com/downloads/20110322_2/download - March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial (reposted/mirrored below)

Memorable scenes in "J. Edgar," the unsung biopic of FBI über-cryptocrat J. Edgar Hoover directed by Clint Eastwood, highlighted Leo DiCaprio's Hoover essentially blackmailing politicians like Robert F. Kennedy & Franklin D. Roosevelt over the decades with potentially embarrassing recordings and snippets. He reminisces with his partner-for-life Colson how well it goes every time.

Now there's an entire corporate contractor sector, nicknamed the Eagle Alliance, which has taken over many core National Security Agency functions, and each one of them are in a position to pull Hoover-like shenanigans to control the political system. This system of leverage & blackmail was described in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider" as the "Control Files."

NSA-Spying-Logo.pngJames Bamford’s NSA, the agency that could be Big Brother: [old link busted, google it :P ]

"That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide."

He added that if a dictator ever took over, the NSA "could enable [him] to impose total tyranny, and there would be no way to fight back."

At the time, the agency had the ability to listen to only what people said over the telephone or wrote in an occasional telegram; they had no access to private letters. But today, with people expressing their innermost thoughts in e-mail messages, exposing their medical and financial records to the Internet, and chatting constantly on cellphones, the agency virtually has the ability to get inside a person’s mind…

"I don’t want to see this country ever go across the bridge," Senator Church said. "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."

Let's hop on down the rabbit hole. The National Security Agency and its beleaguered whistleblowers are back with the Internet's Lawyers Guild - aka the Electronic Frontier Foundation, who have saved the day on countless occasions. Now they are kicking it up a notch with a lawsuit against the 'state secret' everyone knows about -- corporate contractors copying everyone's private domestic communications.

The effort to cover up these programs - MAIN CORE, PINWALE and STELLAR WIND are thought by many to be major original code names for this. Corruption in outsourced programs such as TRAILBLAZER - which the feds went gonzo against Thomas Drake to cover up, form the texture of this story, along with the final total panopticon system which Frank Church feared. [ see earlier Hongpong.com: The late great Robert Nichols, a $250 billion Treasury Note, the Octopus Wiki (all your Iran-Contra/PROMIS style tiebacks) and Main Core, to boot // LinkBatch for August 19th 2010: In-Q-Tel CIA front funded Google Earth; Insane Clown Posse; Microdrones; Fructose tumors; Hamid Gul // Dec 2008: "The World's Largest Hedge Fund is a Fraud" but no one cared: More misc madness for Monday:

'Stellar Wind' revealed by Tamm: The grand illegal wiretapping plan was called Stellar Wind, Newsweek reveals. Good stuff. So: Stellar Wind was the sniffer, MAIN CORE is/was the master repository and/or query system into other databases, the Google or PROMIS tap to the various pockets of data... Datas fed by stuff like Stellar Wind.

See also May 2008: cryptogon.com » The Last Roundup: MAIN CORE: (& subsequent refs)

In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.

Russell Tice, Former NSA SIGINT Officer

I’m going to provide a one paragraph summary, just to make sure that the implications of this are clear to everyone:

The U.S. Government has, almost certainly, established a database and tracking system for something like eight million Americans who have been designated as threats to national security. The system is called MAIN CORE and it is being run under the auspices of highly classified Continuity of Government (COG) operations. MAIN CORE uses a variety of intelligence sources as inputs, including your email, web activity, telephone and private financial information. In the event of a major national security crisis, it is alleged that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.”

The Last Roundup, by Christopher Ketcham, appeared in the May/June 2008 issue of Radar Magazine. (mirror 1, mirror 2.)

Below are some excerpts from The Last Roundup. I have provided explicit pointers to the related materials on Cryptogon:

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [See:AT&T Invents Programming Language for Mass Surveillance]

He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Electronic Frontier Foundation: Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program | Electronic Frontier Foundation

July 2, 2012

Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program

EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed

San Francisco - Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation's (EFF's) lawsuit against the government's illegal mass surveillance program, Jewel v. NSA.

In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the "secret room" at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.

"For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people," said EFF Legal Director Cindy Cohn. "Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We're extremely pleased that more whistleblowers have come forward to help end this massive spying program."

The three former NSA employees with declarations in EFF's brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.

Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.

"The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret," said EFF Senior Staff Attorney Lee Tien. "Yet the government keeps making the same 'state secrets' claims again and again. It's time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance."

For the full motion for partial summary judgment:
https://www.eff.org/document/plaintiffs-motion-partial-summary-judgment

For more on this case:
https://www.eff.org/cases/jewel

Contacts:

Cindy Cohn
   Legal Director
   Electronic Frontier Foundation
   cindy@eff.org

Lee Tien
   Senior Staff Attorney
   Electronic Frontier Foundation
   tien@eff.org

/////////////////////

Jewel v. NSA | Electronic Frontier Foundation

In Jewel v. NSA, EFF is suing the NSA and other government agencies on behalf of AT&T customers to stop the illegal unconstitutional and ongoing dragnet surveillance of their communications and communications records.

Filed in 2008, Jewel v. NSA is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it. Evidence in the case includes undisputed documents provided by former AT&T telecommunications technician Mark Klein showing AT&T has routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA. That same evidence is central Hepting v. AT&T, a class-action lawsuit filed by EFF in 2006 to stop the telecom giant’s participation in the illegal surveillance program.

In addition to suing the government agencies involved in the domestic dragnet, Jewel v. NSAalso targets the individuals responsible for creating authorizing and implementing the illegal program including former President George W. Bush, former Vice President Dick Cheney, Cheney’s former chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales, and other individuals who ordered or participated in the warrantless domestic surveillance.

The Obama administration moved to dismiss Jewel in 2009, claiming that litigation over the wiretapping program would require the government to disclose privileged “state secrets” and that it was immune from suit. The court instead ruled that the case should be dismissed on standing grounds.  Fortunately, in December of 2011, the 9th U.S. Circuit Court of Appeals ruled that Jewel could proceed in district court.

/////////////////////

There aren't that many journalists who regularly cover the National Security Agency, and it's pretty obvious this beat is a shortcut to catching major gangstalking from a whole passel of shadeballs. What better way to see who SAIC will send if you piss them off & expose their enormously profitable contracting rackets & fraud?

James Bamford first wrote The Puzzle Palace, the first book on the NSA which established a great deal for the public about how it operated. His much more recent book The Shadow Factory described a number of major developments since then, including the backbone tapping system which is a major part of Jewel v. NSA.

SEE James Bamford April 2012 WIRED article: Shady Companies With Ties to Israel Wiretap the U.S. for the NSA // March 2012: The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

James Risen with the New York Times is another -- perhaps adjacent to Julian Assange, with a subpoena commanding him he is now in the crosshairs of perpetual federal investigations into the leaking of the warrantless wiretap program that finally abrogated the Fourth Amendment once and for all. NYT May 2011:

In a 30-page motion that prosecutors filed on Monday, they argued that the First Amendment did not give Mr. Risen the right to avoid testifying about his confidential sources in a criminal proceeding. The Justice Department argued that Mr. Risen was a witness and should be compelled to provide information to a jury “like any other citizen,” contending that there was no basis to conclude “that the reporter is being harassed in order to disrupt his relationship with confidential news sources.”  

DC alternative journalist Wayne Madsen, while derided by many in the mainstream & liberal networks as a conspiracy theorist etc (and I wouldn't be surprised if certain factions try to use him to plant early disinfo & poison the well in obscure stories - as often happens with journalists on weird beats) overall Wayne has kept coming up with the goods on the NSA, clearly with a number of inside and veteran sources. Code names in this case STELLAR WIND and PINWALE first entered the public arena via Madsen's site WayneMadsenReport.com.

Madsen has covered the travails of William Binney, Thomas Drake & J. Kirk Wiebe, in particular Drake over the years. Drake's case in particular involves the interests of sketchy Israel-linked contractors in penetrating Americans' private communications using backdoors such as the Narus Verint wiretapping boxes placed on Internet backbone sites, which first surfaced because of whistleblower Mark Klein, who had installed the fiber optic splitter running domestic backbone signals en masse into the 'secret room'.

Anyway much of this is available over In-Q-Tel I mean CIA I mean Google, but the stuff on WayneMadsenReport.com is not. I asked Wayne a while ago and he basically asks for a day or two (or several) for people to refrain from reposting his material outside the paywall. I ask that you support independent journalism - I am reposting these now for general public interest because the situation has finally 'broken out' a little more.

/////////////////

WAYNEMADSENREPORT.COM ITEMS:

APRIL 2012: Let's start on the late side with a April 2012 backgrounder that finally establishes a great deal of the crusade to crush Thomas Drake. It gets to, what else, Israeli contractors and extreme corruption. Plus it has tons of nice NSA program code words.

April 5-6, 2012 -- The background to the Israeli penetration of NSA - Wayne Madsen Report

In June 2005, WMR's first report at itgs inception dealt with Israeli intelligence penetration of the National Security Agency. Our friend and colleague Jim Bamford has written about further details of this penetration in an April 3 article in Wired titled "Shady Companies With Ties to Israel Wiretap the U.S. for the NSA." In the article, Bamford describes the penetration of NSA's ultra-secret surveillance technology research and development "skunk works," the Signals Intelligence Automation Research Center (SARC), located at NSA's headquarters on the third floor of Operations Building 2B, a few doors down from the center where NSA monitored sensitive government communications in Russia.



The SARC is where companies linked to Israel helped set up NSA's controversial and top secret warrantless eavesdropping program code-named Stellar Wind. SARC's chief of staff, J. Kirk Wiebe, and the center's co-founded, Bill Binney, realized that a private company with links to Israel, Technology Development Corporation (TDC), a two-man operation with an Annapolis Junction post office box run by two brothers, Randall and Paul Jacobson of Clarksville, Maryland, was running the Stellar Wind operation using software and equipment provided by two Israeli firms, Narus, later bought by Boeing, and Verint, owned by Comverse Technology, formerly Comverse Infosys. Both companies were formed by ex-Unit 8200 personnel. Unit 8200 is the Israeli counterpart of NSA. The NSA program manager for Stellar Wind was Ben Gunn, a U.S. naturalized Scotsman who once worked for Britain's NSA equivalent, the Goverfnment Communications Headquarters (GCHQ) in Cheltenham, UK.

Rather than investigate the Jacobsons, Gunn and their Israeli interlocutors, FBI agents raided the homes of Wiebe and Binney and confiscated their computer equipment as part of the failed Justice Department investigation of former NSA official Thomas Drake, the whistle blower who exposed massive contract fraud and illegal surveillance by NSA.


Paul Jacobson had his security access pulled by NSA in 1992 and he later changed his name to "Jimmy Carter" and "Alfred Olympus von Ronsdorf." Randall Jacobson continued working for NSA and when Science Applications International Corporation (SAIC) was brought in to run the nascent Stellar Wind program, taking over from TDC, Randall Jacobson tipped Binney off to the illegal nature of the eavesdropping program, which included installing wiretapping rooms in some 20 telecommunications company switches around the United States, including the one exposed by former AT&T technician Mark Klein that was installed at the AT&T switch in downtown San Francisco.

Binney told Bamford that the NSA's advanced eavesdropping and data mining high-data analytical software may have been originally passed to Israel by a pro-Israeli technical director in NSA's Operations Directorate. The original software helped Narus and Comverse/Verint to improve on the work already performed by NSA and more advanced systems were then sold back to the NSA. The major compromise of NSA technology to the Israelis should have been made known to Binney, who was then the chairman of the NSA's Technology Advisory Panel, which monitored the signals intelligence capabilities of foreign nations. Rather than pass on to NSA the intelligence "take" of Unit 8200 using the NSA technology, Binney told Bamford that he believed that the Israeli government simply passed on the technology to Israeli start-up companies that used the NSA-developed know-how to spy on foreign countries, including the United States, and sell the technology back to countries like the United States.

The Israeli penetration of NSA was brought to WMR's attention by NSA personnel in June 2005. One of the firms mentioned as being involved in the compromise to Israel was CACI, part of an alliance of NSA contractors called the "Eagle Alliance." WMR reported: "CACI, called 'Colonels and Captains, Inc.' by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations."

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel.

Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods.

In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

[On June 5, 2005, WMR followed-up its story of Israeli spying at NSA: "Veterans of the RCA-NSA-Israeli joint SIGINT program code named DINDI report that Israeli engineer spies used the carve out contract with NSA, through RCA, to gain access to NSA and U.S. Navy secrets. In an RCA facility in Mount Laurel, NJ, the Israeli engineers had their own secured lab, and for three years that DINDI ran, they were walking out with their briefcases loaded with equipment, including scopes. When RCA engineers finally gained access to their lab, they found the prints laid out for the Trident missile system. RCA had an ongoing contract top develop the Trident communications suite at the time of the security leak. The Israeli engineers on DINDI claimed they were from the Israeli Air Force but months later, an RCA engineer was in New York and he ran into the same Israelis, but they were wearing Israeli Navy uniforms. One ex-RCA engineer commented about the DINDI Israeli spies: 'They were all a nice bunch of guys, even when they had their hands in your pockets.'] One RCA contractor for NSA later told WMR that the RCA program manager for DINDI, a Jewish engineer who he only named as "Irv," permitted the Israelis to rummage through NSA and RCA classified information.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual 'Fort Knox' of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person [then-NSA director Michael Hayden] hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, 'She's highly qualified to work in intelligence!'

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or 'WINTEL' environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to 'provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA.' This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: 'Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program.' The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

Hayden was later "rewarded" for his actions at NSA by being named the first deputy director for the Directorate of National Intelligence (DNI) and, later, director of the Central Intelligence Agency. After retiring, Hayden began working for former Department of Homeland Security Secretary Michael Chertoff, who has also been alleged to have close contacts with Israeli intelligence, at Chertoff Associates.

A journalist who previously covered the Justice Department for a major wire service told WMR that FBI agents and Justice Department prosecutors are dissuaded from investigating spies for Israel since it is known to be a "career killer" at both agencies. Moreover, Justice prosecutors have two sets of guidelines when it comes to prosecuting spies. One set calls for maximum treatment, including major criminal charges and heavy prison sentences and fines, for American spies who are charged with spying for Russia, China, Cuba, or Iran, and the lightest charges and penalties for those charged with spying for Israel, especially if they are Jewish.

//////////

Now back to the earlier material.

APRIL 2010: April 16-18, 2010 -- SPECIAL REPORT. The hidden hands behind the Thomas Drake indictment - Wayne Madsen Report

There is much more to the Obama administration's indictment on April 15 of former NSA senior executive Thomas Drake by the US Attorney for Maryland, Rod Rosenstein, a Bush holdover who has brought similar politically-motivated criminal charges against other NSA personnel. Drake is charged with ten criminal counts, including leaking classified information to a newspaper. WMR can confirm the paper is The Wall Street Journal and the reporter at the Journal who received Drake's information is Siobhan Gorman, who was also subject to electronic surveillance by the NSA and FBI while she was with the Journal and previously, The Baltimore Sun. Other charges brought against Drake, who continued to work for the NSA as a contractor after stepping down as an NSA executive, include obstruction of justice and making false statements to a federal law enforcement official.

Since leaving his executive position with the NSA, Drake has served as President and Chief Operating Officer of National Technologies Associates, Inc. of Alexandria, Virginia. The firm has revenues of $50 million and employs 600 people. Before NSA, Drake was an information technology and management consultant with Coastal Research & Technology, Inc. (CRTI).

While at NSA, Drake worked in the Signals Intelligence Division (SID), the group responsible for eavesdropping on foreign communications and, since the advent of warrantless domestic surveillance, domestic U.S. communications, as well.

WMR can report that as part of the Drake investigation, Gorman and the Wall Street Journal were subject to STELLAR WIND, warrantless wiretapping, as late as last year. The surveillance began when Gorman wrote a series of articles between 2006 and 2007 on NSA contracting cost overruns and mismanagement, information that was first reported by WMR in 2005.

From WMR, May 27, 2005: Up to now, little has been reported on how the Bush administration’s disastrous intelligence policies have affected the super secret National Security Agency (NSA). According to NSA insiders, the chief U.S. signals intelligence (SIGINT) collection agency has been wracked by much of the same internal feuding, senior management failures, and external political pressure that have plagued other U.S. intelligence agencies, including the CIA, FBI, Defense Intelligence Agency, National Geo-spatial Intelligence Agency, and National Reconnaissance Office.Drake's prosecution by the Obama administration represents a continuation of a "witch hunt" by NSA and its Stasi-like Security unit, the "Q Group," to plug all leaks from the signals intelligence and cyber-warfare agency even if the information provided to the media concerns criminal conduct like contract fraud, sexual misconduct, illegal surveillance of American citizens, and illegal "sneak an peek" break-ins of the homes of NSA employees and contractors by NSA Q Group personnel and FBI agents.

NSA insiders lay blame for the problems at NSA’s Fort Meade, Maryland headquarters squarely on the shoulders of agency Director Air Force General Michael V. Hayden and his small coterie of close advisers, a few of whom have no substantive intelligence background. Hayden has been NSA Director since March 1999, the longest tour for any NSA Director. Not only did the White House extend Hayden’s NSA tour, but also nominated him to be the first Deputy Director of National Intelligence, where he will serve under John Negroponte.

Hayden’s reign at NSA has been marked by the emaciation of the career civilian corps through forced retirements and resignations, outsourcing of government positions to contractors, intimidation, forced psychiatric and psychological examinations for "problem" employees, increased workloads for shift personnel with no personnel augmentation, unreasonable personal searches by security personnel, and withholding salary increases for career personnel. A number of NSA employees are suffering from stress and fatigue and that is adversely affecting their job performance.

One of the most pervasive operational problems at NSA stems from the fact that when newly trained civilian and military linguists, analysts, and other operational personnel arrive at NSA for duty and are integrated into various operational work centers, they are soon quickly transferred to Iraq. This puts an inordinate workload on the career civilian NSA personnel . . .

Career NSA personnel claim that their most senior member, Deputy Director of NSA William B. Black, Jr., shows little interest in their plight. One long-time NSAer said Black often nods off at Hayden’s staff meetings. In 2000, Black, a retired NSA employee with 38 years of service, was rehired by Hayden from Science Applications International Corporation (SAIC) to be his deputy. Hayden’s selection of Black from outside the agency was considered a slap in the faces of those line NSA officers who would have been normally considered next in line for promotion to the much-coveted post. That slight began to severely affect agency morale a little over a year before the September 11, 2001 terrorist attacks on New York and Washington.

After 911 and subsequent revelations that NSA had intercepted two Arabic language phone calls on September 10, 2001 ("Tomorrow is zero hour" and "The match is about to begin") that indicated an imminent attack by Al Qaeda but failed to translate and analyze them in a timely manner to be effective, Hayden was looking for scapegoats. According to NSA insiders, he found one in Maureen A. Baginski, the Director of NSA’s Signals Intelligence (SIGINT) Directorate. According to the NSA insiders, Baginski, a 27-year NSA veteran and Russian and Spanish linguist, was set up for a fall by Hayden and his team. In 2003, Baginski was named Executive Assistant Director of the FBI for Intelligence. According to NSA sources, it was Baginski who carried out Hayden's directives that farmed out many Fort Meade functions to other facilities. Another Hayden project, "Groundbreaker," the outsourcing of NSA functions to contractors, has also been used by Hayden’s advisers to assign blame for the 911 failures at NSA. According to NSA insiders, Groundbreaker has been a failure . . .

Another one of Hayden's projects that has been criticized by the NSA rank-and-file is "Trailblazer," the program to modernize NSA's SIGINT systems. For example, operators in U.S. electronic warfare aircraft rely on NSA to provide accurate electronic intelligence (ELINT) data in order to program their radar warning receivers and jamming pods. However, NSA data, provided from two databases known as EPL (Emitter Parameter List) and "Kilting." 70 percent of NSA's ELINT data is 30 years old. NSA management has forced field operators to use raw ELINT intercept data, culled from a database called "Wrangler," to program their ELINT systems. NSA operations and software engineers believe this function should be handled by NSA and not the "warfighters." Updated ELINT data is handled by ELINT Technical Reports or "ELTs." In 2003, the year the Iraq war started, there were 938 ELTs submitted on new emitter data. However, there were only 200 updates made to the ELINT databases.

The failure to update the ELINT databases may have had disastrous consequences in Iraq. For example, EPL and Kilting do not contain data on air traffic control radars and microwave communications links. Because current ELINT systems cannot differentiate between commercial signals and hostile target tracking emitters, U.S. forces in Iraq have launched attacks on non-threat targets in the belief they were hostile. NSA sources report that many of the cases of fratricide in Iraq has been due to faulty or old ELINT data. For example, the failure by NSA to update ELINT data and provide emitter parameter data to warfighting units led to the accidental shootdown by a Patriot missile of a British Royal Air Force Tornado fighter in March 2003 near the Iraqi-Kuwaiti border at the outset of the Iraq campaign. Two British crew members were killed. The ELINT data used by the Patriot misidentified the Tornado as an enemy missile and the U.S. Army blamed the British crew for the mistake, claiming they failed to switch on its Identification Friend or Foe (IFF) equipment. NSA insiders claim that allegation was false. They claim that "blue signals" (friendly) are not adequately included in the emitter data sent to field units by NSA and that claims by the Pentagon that the Tornado was shot down due to pilot error were false.

In other incidents, the radar warning receivers (RWRs) on U.S. F-16s flying over Iraq have either evaded or fired AMRAAM (Advanced Medium-Range, Air-to-Air) missiles on microwave communications towers because the microwave signals were identified as threat emitters from hostile aircraft. U.S. jammers are also adversely affected by the failure to update ELINT data.

In fact, many of NSA's developmental ELINT systems, with cover names like Beikao, Boomvang, Canyondust, Cape Lookout, Chartvein, Eagle Reach, Galaxydust, Harpstring, Hokusai, Irish Den, Jetavator, Monocle, Needleice, Platoonwolf, Quadrunner, Radiant Spruce II, Roman Alliance, Seadiver, Shadowboxer, Sharkbite, Shiloh, Starquake, Stouthearted,and Sunbeaver are not found in the master NSA ELINT project database, which also has a cover name: Brasscoin.

Many of NSA's other SIGINT systems are in the same conundrum. Rather than simplify and modernize NSA's SIGINT development and deployment, Trailblazer has done nothing to modernize or cut acquisition costs. In a suspicious move by NSA, the Trailblazer contract was sole-sourced to SAIC, the firm from which Hayden hired his deputy director. As with Groundbreaker, Trailblazer's contractors consist of a team led by a prime contractor. Trailblazer's team overlaps with Groundbreaker -- companies like CSC and Northrop Grumman are also found on the Trailblazer team. Booz Allen Hamilton and Boeing are also on the SAIC team. According to NSA officers, one SAIC official left the firm to work for Hayden at NSA during the time the Trailblazer bidding process was underway. The individual then returned to SAIC as a senior vice president, according to NSA sources. NSA employees, upset about the control that SAIC now has over the agency, refer to NSA as "NSAIC." . . .

At his Senate Select Intelligence Committee nomination hearing for Deputy Director of National Intelligence, Hayden confirmed that Trailblazer was over budget and behind schedule. He told the committee that Trailblazer's "cost was greater than anticipated in the tune, I would say, in hundreds of millions." Hayden confirmed the report of the joint congressional committee that probed the 911 intelligence failures that Trailblazer was several years behind schedule. NSA sources claim that Trailblazer is at least five years behind schedule and $600 million over budget.

However, the career NSA operational personnel may be getting squeezed not so much for policy and management differences but because of what they know about the lies of the Bush administration. In addition to the obvious lies about Iraqi WMDs, many personnel are well aware that what occurred on the morning of 911 was not exactly what was reported by the White House. For example, President Bush spoke of the heroic actions of the passengers and crew aboard United Flight 93 over rural Pennsylvania on the morning of 911. However, NSA personnel on duty at the NSOC that morning have a very different perspective. Before Flight 93 crashed in Pennsylvania, NSA operations personnel clearly heard on the intercom system monitoring military and civilian communications that the "fighters are engaged" with the doomed United aircraft. NSOC personnel were then quickly dismissed from the tactical area of the NSOC where the intercom system was located leaving only a few senior personnel in place. NSA personnel are well aware that Secretary of Defense Donald Rumsfeld did not "misspeak" when, addressing U.S. troops in Baghdad during Christmas last year, said, "the people who attacked the United States in New York, shot down the plane over Pennsylvania." They believe the White House concocted the "passengers-bring-down-plane" story for propaganda value.

Morale at NSA has plummeted from repeated cover-ups of serious breaches of security by senior officials. While rank-and-file employees are subjected to abusive psychological and psychiatric evaluations for disagreeing with summary intelligence reports provided to outside users or "consumers" and even for more mundane matters, others are given a pass. Ironically, one of the psychiatrists used by NSA to evaluate problem or disgruntled employees was recently found by police to be growing marijuana at his home in Crofton, Maryland.

In 2008, NSA and FBI surveillance of current and former NSA and Justice Department employees who were suspected of leaking information to the press about the NSA's super-classified STELLAR WIND warrantless digital surveillance program, called the "Terrorist Surveillance Program" by the Justice Department, was stepped up.

On March 10, 2008, Gorman wrote an article for the Journal titled, "NSA's Domestic Spying Grows As Agency Sweeps Up Data." Gorman wrote:

"According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called 'transactional' data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA's own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge's approval when a link to al Qaeda is suspected."

The previous year, as WMR reported in May 12, 2009, former Justice Department prosecutor Thomas Tamm's home was invaded by a SWAT team of federal agents:

In 2007, Tamm's home in Potomac, Maryland was raided by zealous FBI agents who suspected him of leaking details of the so-called "Terrorist Surveillance Program" (TSP) to journalists. Tamm tried to inform Congress about the illegal program but was rebuffed by, among others, the ranking Democrat on the House Judiciary Committee, Representative John Conyers (D-MI).

At the time of its inception after 9/11, the TSP or as NSA and the Oval Office referred to it, "Stellar Wind," was so classified that only the Attorney General and one other person in the Justice Department knew about it. The TSP totally bypassed the Foreign Intelligence Surveillance Act (FISA) warrants that the OIPR prepared for approval by the Foreign Intelligence Surveillance Court (FISC). U.S. Judge James Robertson was so incensed about the bypassing of the FISC, he resigned from it in protest on December 20, 2005. U.S. Judge Royce Lamberth, nominated by President Ronald Reagan and who served as Presiding Judge of the FISC until 2002, was also adamantly opposed to TSP and its systematic bypassing of his court.

WMR's report continued: Tamm was also the first person within Justice who corroborated what NSA personnel were reporting about the agency conducting illegal data mining. One of those individuals was NSA employee Russell Tice, who was also subjected to an FBI investigation and government harassment.

Although the government employees who brought attention to the high-level criminality involving the TSP/Stellar Wind were and, in some cases like that of Tamm, are still being investigated, no criminal investigations were brought against the telecommunications companies that participated in the criminal conspiracy to spy on Americans illegally. In fact, Congress gave the telecommunications firms immunity from lawsuits and prosecution as a result of a deal worked out with the Bush administration. One of those senators who voted for the immunity deal is Barack Obama.

After the FBI conducted interviews of all OIPR employees in their quest for the leaker, on August 1, 2007, 12 government vehicles pulled in front of Tamm's home in Potomac, Maryland. Eighteen armed federal agents wearing body armor stormed into Tamm's home while his wife was cooking breakfast. Tamm was removed from his home by the agents who spent seven hours going through his and his family's property. The FBI agents even asked Tamm if there were any "secret rooms" in his house. They also inquired about any weapons in the house and whether he had been visited at home by reporters from The New York Times.

The agents tore through every room, awakening Tamm's son and daughter. The agents seized all the lap top computers, including those of Tamm's children, and a 10-year old lap top. Also seized were the Tamm family's Christmas card list and a calendar with doctors appointments.

After two days, Tamm was offered a deal that he could plead guilty to a felony in return for his testifying against journalists, including the New York Times' James Risen, and their sources at the NSA. Three days later Michael Isikoff of Newsweek phoned Tamm -- someone had leaked information about the FBI raid to Isikoff. Tamm's identity as a source about the TSP was revealed by Isikoff in the December 22, 2008, issue of Newsweek.

In 2008, one of WMR's sources discovered that his home had been broken into and anything that could store digital data had been stolen: laptops, digital cameras, USB thumb drives, etc. Moreover, relatives of the individual discovered that the lock to their home had been drilled out in what was an obvious "black bag" sneak and peel operation.

That same year, this editor discovered that the lock to his apartment door at Potomac Towers in Arlington, Virginia had been drilled out by a circular saw drill bit that drilled around the lock cylinder. When the apartment maintenance man was called to check the lock, he discovered the fragments of the lock pins scattered on the floor at the base of the door. He stated at the time that he had never experienced anything like it in the past.

FBI and NSA surveillance of people affiliated with NSA continued through last week, with this editor and one of his sources being tailed in 2009 in the suburban Maryland suburbs of Washington, DC and an additional tail of a source being conducted last week in Annapolis, Maryland.

The indictment of Drake in reminiscent of the case brought against former NSA signals intelligence (SIGINT) analyst Ken Ford, Jr. in 2006. In March 2006, Ford was sentenced to six years in prison in a case replete with prosecutorial and judicial misconduct by Rosenstein, Assistant US Attorney David Salem, and US Judge Peter Messitte. On April 30, 2007, WMR reported: "Ford was set up in a clumsy Justice Department, FBI, and NSA Security Division operation to punish him for his May 2003 signals intelligence (SIGINT) analysis report that concluded, based on intercepts of Iraqi communications, there was no truth to the Bush administration’s claim that there were weapons of mass destruction in Iraq. Ford’s report, with his name and that of his supervisor on it, ended up on Vice President Dick Cheney’s desk. From that time on, Ford was a marked man for the neo-con cabal operating within the White House, Justice Department, Pentagon, and US Intelligence Community senior staff."

At one point during Ford's trial, Messitte called Ford to his bench and asked him if he had spoken to this editor. Ford replied that he had not, whereupon Messitte asked, "Is Mr. Madsen in the court room?" I was not present at the time but I was later told by an informed source that Messitte was prepared to call me to the stand to be asked about the sources of my stories on the case. Such a development would have required me to invoke my First Amendment rights, as the press is the only occupation identified by name in the Bill of Rights as being protected. There was a risk of a contempt ruling and possible federal prison had I been present during Messitte's "kangaroo court" proceedings.

Ford continues to serve his six year sentence at Lewisburg federal prison in Pennsylvania. Attorney General Eric Holder was sent a letter by Ford's parents on November 18, 2009, calling for the appointment of a special prosecutor in the case against their son. To date, Holder has not responded to the letter.

The letter follows:

November 18, 2009

SENT CERTIFIED MAIL / E-MAIL / FACSIMILE

RETURN RECEIPT

Honorable Eric H. Holder. Jr.

Attorney General of the United States

Honorable David W. Ogden

Deputy Attorney General of the United States

950 Pennsylvania Avenue, N.W.

Washington, D.C. 2053 0-0001

United States v. Kenneth Wayne Ford. Jr.

Criminal Case No(s): 04-cr-l l8JKS, 05-cr-0098PJM and 05-cr-0235PJM

Messrs. Holder and Ogden:

In the interest of justice, we, the parents of Kenneth Wayne Ford, Jr., ("hereafter Mr. Ford") request an immediate appointment of Special Counsel to investigate unwarranted prosecutorial misconduct, vehement malicious persecution and prosecution of Mr. Ford under the Espionage Act §793 (e) - Gathering, Transmitting or Losing Defense Information. On Wednesday, September 23,2009, President Obama mandated that DOJ establishes New State Secrets Policies and Procedures.1

President Obama's implementation of State Secrets and Policies encompasses matters in this case. Prosecutors knowingly and willfully engaged in conduct involving dishonesty, fraud, deceit and misrepresentation throughout this case and trial. Mr. Ford was convicted under 793(e) - Espionage and 1801 - Making A False Statement On A Government Form. Mr. Ford was sentenced to 6 years in prison for Count 1 and 3 years in prison, to be served concurrently with Count 1, for Count 2. After imprisonment, Mr.

---------

1 “It sets out clear procedures that will provide greater accountability and ensure the state secrets privilege is invoked only when necessary and in the narrowest way possible...” Attorney General Eric Holder September 23, 2009

Ford is to be on probation for 3 years. He also was ordered to pay a $200.00 assessment. Mr. Ford began serving this unjust prison sentence on May 16. 2006. He has been in prison for over 3 years and 6 months for doing absolutely nothing, except being a patriotic American and a good person.

Not only is Mr. Ford innocent, but nothing happened. This case is totally fabricated by the FBI and all involved, specifically the prosecutors and judge know it. Mr. Ford is a victim of a hate crime, a malicious prosecution and a tragic rush to jail an innocent man. See North Carolina v. Seligmann 06-cr-4332-33 (Dismissed 4/712007), Franks v. Delaware, 438 U.S. 154 (1978) and Brady v. Maryland, 373 U.S. 83 (1963). These cases demonstrate that 'false' arrest can happen to anyone - as in the matter of distinguished Harvard professor Henry Louis Gates, Jr., one of the nation's pre-eminent African-American scholars, falsely arrested in his own home.

A. Prosecutors Willfully Withheld Exculpatory Evidence From Defense

DOJ prosecutors repeatedly invoked state secret privileges, suppressed evidence as classified and deliberately withheld from Mr. Ford's defense exculpatory FBI Search Warrant Affidavits for well over 19 months. Ultimately, these search warrant affidavits were suppressed from Mr. Ford's trial. We have recently discovered that these affidavits have never been filed and are not apart of Mr. Ford's official court file.

On December 15, 2005, United States Attorney For The District of Maryland Rod J. Rosenstein and Criminal Division Assistant Attorney General Alice Fisher issued a press release in Mr. Ford's case, which stated in part, that: (Though there was conflicting evidence of what Ford intended to do with the classified information - the jury's verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information". With the admission of Rosenstein that there existed "conflicting evidence" in Mr. Ford's case and the fact that the judge removed the required elements of 'belief... and intent...' from the jury instructions, should have rendered the indictment defective. (See Exhibit A - Rosenstein Press Release dated 12/15/2005)

FBI Special Agents Michael L. Thompson and Frederick C. Marsh both submitted sworn search warrant affidavits to a federal judge alleging that a Tonya Tucker had contacted the NSA to report Ford's alleged espionage. (Ford had known Tucker for 9 weeks - from 11/13/2003 to 1/11/2004 - and decided that she definitely was not his type. He later realized Ms. Tucker is a FBI confidential informant and was placed into his life by Special Agent Michael L. Thompson.) Defense counsel subpoenaed cell phone records of Tonya Tucker from Sprint, which clearly listed the voice call details of Date, Time. Phone Number. Destination, etc. (Tucker's alleged cell phone calls were described in the Thompson affidavit and completely identified in the Marsh affidavit.

From this, we were able to subpoena thru our attorney, her cell phone records.) Sprint records affirmed that Tonya Tucker Did Not contact NSA on January 5.2004. January 9. 2004. January 10. 2004 and January 11, 2004 from her cell phone number 407-616-5683 listed on the Sprint telephone record print-out and on page 5 of 12 of FBI Special Agent Frederick C. Marsh's sworn search warrant affidavit, which he wrote was "in support of the sworn search warrant affidavit" submitted the previous day, to the same judge, by FBI Special Agent Michael L. Thompson.

With the introduction of the subpoenaed cell phone records, it is apparent the Thompson and March search warrant affidavits are perjured and fabricated. Both agents are therefore subject to penalties of perjury. Also. very importantly. the cell phone (It should be noted here that prosecutors told the jury that Ms. Tucker was a friend of Mr. Ford's and simply was a "tipster".) (See Exhibit B - FBI Affidavits and Tonya Tucker's Cell Phone Records)

Mr. Ford, as required by NSA regulations, earlier reported a threatening e-mail sent to him on Tuesday, November 25th2003 at his "AOL" address a month and a half before his arrest. The e-mail was sent by a "Dr. Takiya", who claimed to be a friend of Tonya Tucker. Based on newly discovered evidence on September 1.2009, it was confirmed that Ms. Tucker is the author of the e-mail. Ms. Tucker signed her name onto an internet guest book August 15, 2006 with the e-mail address of Msunique_2@yahoo.com, which is the same e-mail address of the treat letter sent to Kenneth Wayne Ford, Jr. on Tuesday, November 25 .2003.

The e-mail threatened Ford that his security clearances would soon be revoked. She said she knew people at NSA who had clearances just like he did. Ford reported the e-mail the very next day to NSA Head Security Officer Anne Mennis. She ignored the email, not taking it seriously at all.. Ultimately, the admission of the e-mail as exculpatory evidence to Mr. Ford was suppressed from the trial by the judge. (See Exhibit C - Threatening E-Mail / Newly Discovered Evidence).

Newly discovered evidence of a newsletter dated March 31. 2006, states that FBI Special Agent Dave Evans was the lead FBI supervisor in the case against Mr. Ford. The defendant, Mr. Ford, was never aware that FBI Special Agent Dave Evans existed. (We, his parents, discovered this newsletter on the internet in 2008.) FBI Special Agent Evan's newsletter was titled, Maryland Man Sentenced For 'Stealing Secret Documents'. However, indictments alleged that Mr. Ford was charged with 'Unauthorized Possession of National Defense Documents" - not theft of secret documents.

FBI Special Agent Evans also said that: “As it turned out, our tipster was and didn't even make the drive to the airport." Nonetheless, the prosecutors continued to prosecute and incarcerate an innocent man.

FBI Special Agent Evans also stated that: (Our agents ultimately determined ultimately ended up in." Nonetheless, prosecutors indicted and incarcerated Mr. Ford with knowledge that 6'qonflicted evi4ence" existed in this case. (See Exhibit D – FBI Special Agent Dave Evans' Newsletter dated 3/31/2006)

Certainly, the defense has a right to depose and cross-examine the FBI Special Agent who was the lead supervisor in this case. Prosecutors withheld FBI Special Agent Evans from the defense. They also withheld Special Agent Frederick C. Marsh from the defense. The Marsh affidavit was suppressed during the suppression hearing by the judge, Judge Peter J. Messitte, before the trial began on 11/29/2005. Thus, that which brought Mr. Ford into the legal system and ultimately into a federal courtroom for prosecution, was not allowed into the trial. The jury was unaware of the affidavits. (The defense did not get them until 19 months after Mr. Ford’s arrest. Please keep in mind Mr. Ford has been totally under arrest the entire time since 1/11/2004 to the present.) To date, those affidavits have never been filed. They are not listed on the docket page of the case and they are not physically in the court file. It was represented and testified to the jury by DOJ prosecutors and FBI Special Agent Michael L. Thompson that he was the lead agent and only agent assigned to the Ford Case.

B. Even If Papers Had Been Present – The Text of §793 Is Vague And Should Not Have Been Applied In This Case

First, the statutes require that a defendant transmit information relating to the national defense. There are no allegations that Mr. Ford ever transmitted, sold, stole, secreted, purloined, paid for or otherwise obtained classified information inside or outside the government - by any illegal means. Legislative history of $793 makes plain that [Congress was concerned with spying].

The government never charged Mr. Ford with spying, injury to the United States on behalf of a foreign nation or communication to any person not entitled to receive classified information. Due process requires that a criminal statute provide a person of ordinary intelligence fair notice that his contemplated conduct is forbidden. See Thomas v. Davis, 192 F.3d 445,45514n Cir. 1999). If a law is "vague or highly debatable, a defendant - actually or imputably - lacks the requisite intent to violate it." See United States v. Mallas. 7 62 F .2d 36r , 363 14'n cir.1985). criminal prosecution for the violation of an unclear duty itself violates the clear constitutional duty of the government to warn citizens whether particular conduct is legal or illegal. See U.S. v. Rosen and Weissman 05-cr-225.

A statute cannot be construed so as to delegate to prosecutors and juries the "inherently legislative task" of determining what type of possession of national defense information are so reprehensible as to be punished as crimes. See United States v. Kozminski. U.S. 93 1,949 (1988) (rejecting construction of criminal statute that would *delegate to prosecutors and juries the inherently legislative task of determining what type of coercive activities are so morally reprehensible that they should be punished as crimes").

Second, the canon of strict construction of criminal statutes and the rule of lenity ensure fair warning by resolving ambiguity in a criminal statute as to apply it only to conduct clearly covered. Lanier, 520 U.S. at 266. Third, due process bars courts from applying a novel construction of a criminal statute to conduct that neither the statute nor any prior judicial decision has fairly disclosed to be within its scope. Each of these three elements is based on the fact that it must have been reasonably clear the time that the defendant’s conduct was criminal.”

United States Attorney for the District of Maryland Rod Rosenstein confirmed by his own statement that: "Though there was conflicting evidence of what Ford intended to do with the classified information – the jury’s verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information.”

Therefore, one would conclude that it was apparently not 'reasonably clear' that Ford's alleged conduct was criminal. Our son was incarcerated based on “unclear conflicting evidence'. An egregious miscarriage of justice at the highest level is evident throughout this case.

Each of these three manifestations is based on the notion that it must have been "reasonably clear at the time that the defendant's conduct was criminal". Elements applied to Mr. Ford's case affirm that reasonable clarity was severely lacking. Courts have ruled that §793 (d) and (e) apply only to the transmission of tangible information. ln fact, these rulings were the basis of Special Counsel Patrick Fitzgerald's explanation as to why he did not bring charges under the Espionage Act §793 against either the government officials who leaked the name of CIA agent Valerie Plame to the press or the reporters who subsequently reported that name to millions of readers around the world.

The following exculpatory evidence, which would have exonerated our son, was suppressed from the trial and jury: 1) FBI Form 302 Statement by Tonya Tucker (FBI Confidential Informant), 2) Tonya Tucker's threatening e-mail to Mr. Ford and 3) Special Agents Thompson's and Marsh's Search Warrant Affidavits. Special Agent Marsh's affidavit clearly affirmed on January 11, 2004, page 6 of 12 that: “A review of criminal history records reflect that TUCKER has a number of arrests, including arrests for Driving while suspended, Criminal trespassing, Robbery, among others."

Courts have repeatedly ruled that the government may not excuse its presentation of false testimony by claiming that: (a) it did not know, (b) it did not understand what other agencies knew, or (c) it believed the testimony. It cannot use these excuses because they are not the law and the facts do not support them. See Mesarosh. et al v. United States, 352 U.S. I (1956); Giglio v. United States, 405 U.S. 150 (1972); and United States v. Mason, et al., 293 F.3d, 826 (5th Cir.2002). Fourth Amendment violations enumerated in the matter of Franks v. Delaware were repeated violations perpetrated on Kenneth Wayne Ford, Jr. by the United States Department of Justice (DOJ). In the matter of Franks v. Delaware, the Court held that: "Where the defendant makes a substantial preliminary showing that a false statement that a hearing be held at the defendant's request."

Federal prosecutors in Mr. Ford's case willfully applied national security standards of the suppression of evidence and discovery. DOJ prosecutors willfully enforced national security clearances upon defense counsel with full knowledge that DOJ did not obtain mandatory FISA applications and approvals.

Prosecutors ignored strict procedural requirements in accordance to the Foreign Reform Act of 2000"). Prosecutors clearly violated Title VI §603, 605 and 607. This case should never have been prosecuted. Title VI $608 provides, in part, that: "If any provision of this title (including an amendment made by this title), or the application thereof, to any person or circumstance, is held invalid, the remainder of this title (including the amendments made by this title), and the application thereof. to other persons or circumstances shall not be affected thereby.”

C. Background

Kenneth Wayne Ford, Jr. is now 38 years old. He is the cream of the crop of young American citizens. He is an African-American and is highly educated. Mr. Ford graduated from DeMatha Catholic High School in Hyattsville, Maryland in 1990. He then went to the University of Miami in Coral Gables, Florida and graduated from there in 1995 with a Bachelor of Business Administration in Management and Organization degree. Mr. Ford served 4 years in the Uniformed Division of the Secret Service, where he received two cash awards in consecutive years for outstanding service. While in the Secret Service, Mr. Ford continued his education and enrolled into Strayer University. To his credit, he graduated in 2001, summa cum laude" earning a Bachelor of Science in Computer Networking degree. Later, Mr. Ford enrolled in the Masters program at Strayer University, earning in 2004, a Master of Science in Information Technology degree.

In 2001, Mr. Ford accepted employment at NSA as a Signals Intelligence Analyst. While employed at NSA, he received a cash award for outstanding service. Later, he was recognized with a large plaque - his name listed, among others, for outstanding work on a particular project. It was disclosed in the trial by a State Department officer that Mr. Ford had security clearances that less than 150 people in the entire country hold. Mr. Ford has worked extremely hard all his life, as he was not born with a silver spoon in his mouth, inherited wealth or privilege. He has spent over 23 years acquiring an education. He would never do anything to jeopardize his life or his accomplishments. After Mr. Ford's conviction, Mr. Lambert, the probation officer assigned to formalize his pre-sentencing report, commented to me (his mother) and included in his report that "Kenneth has not even had a traffic ticket."

D. Case Overview

On Sunday, January 11. 2004. FBI Special Agent Michael L. Thompson and NSA Security Officer Robert McCaslin arrived at Mr. Ford's home at approximately 5:50 p.m. and fabricated that they wanted to talk to him about his former position. Mr. Ford invited them in because he was led to believe they wanted to get his expertise on a work-related situation. About ½ hour later, their attitudes changed and Mr. Ford realized they were unjustly accusing him of espionage. Simultaneously, with these accusations, they began searching his home - 2-I/2 hours before the search warrant arrived. FBI Special Agent Frederick Marsh arrived with a search warrant and about 23 additional agents.

During the course of this ordeal, Mr. Ford was threatened by Special Agent Michael L. Thompson's unnecessary withdrawal of his gun. He was terrorized for 7-1/2hows as the agents rampaged his home. He was not allowed to leave his residence, contact his parents or answer his telephone. He was denied food and water. He was not allowed to use his own bathroom until Thompson took him away from his home -7-1/2 hours later. See Title 18, Part I, Chapter 113C - Torture - "an act committed by a person acting under the color of law specifically intended to inflict severe physical or mental pain or suffering (other than pain or suffering incidental to lawful sanctions) upon another person within his custody or physical control." (See Exhibit E -Letter by Kenneth W. Ford, Jr. Documenting Events)

E. DOJ Triple Jeopardy Indictments

The government's 1st indictment, and 2nd case number, was filed on 3/4/2005. U.S. District Court Judge Peter J. Messitte dismissed the case without prejudice on 5/162005. The 2nd indictment, and 3rd cse number, dated 5/23/2005, contained the exact charges and language as the ls indictment. The 3rd indictment, which we had no knowledge of until recently, is dated 11/28/2005. The docket indicates that there was a superseding indictment, arraignment and plea of not guilty all on the same day – 11/28/2005. It indicates Mr. Ford appeared before Judge Messitte and gave a plea of 'not guilty' to each of the two counts against him. This is untrue. Mr. Ford never appeared before Judge Messitte or any other judge on 11/28/2005. His trial started the next day, 11/29/2005. It is impossible to appear for an arraignment one day and be tried by jury the very next day.

It should be noted here that on March 30,2006, at the end of Mr. Ford's 2ndsentencing hearing, Judge Messitte dismissed the original indictment. He and Prosecutor Salem signed papers to that effect. Judge Messitte said several times during the trial, Mr. Ford was being prosecuted on the superseding indictment. (Of course, this is impossible.) Apparently, at some point, Judge Messitte and Mr. Salem realized this. Consequently, this dismissal has never been filed, is not in Mr. Ford's court file and is not on the docket. (See Exhibit F - Indictments, Docket Listings of 1//28/2005 Superseding Indictment, Arraignment and Not Guilty Plea and Transcript Page of Dismissal of Original Indictment) Also See $3434 - Presence of Defendant - (Rule) 3

Also, there appears on all three indictments: 'Aiding and Abetting (1S U.S.C. §2)'. Mr. Ford was never charged with this crime. It does not appear anywhere else in the indictment nor was it addressed in the trial to the jury. In addition to the indictments being illegal, these acts make the indictments themselves faulty.

The 1st count was cited under Federal Criminal Code 793(e) - Espionage. FBI Receipt For Property Seized / Form 597 listed all items seized from Mr. Ford's residence. Ironically, there was not one (1) document identified as 'classified papers' prosecutors falsely alleged were taken from Mr. Ford's residence.

At the trial, FBI Special Agent Bridget Bigham, Seizing Agent, testified that she was told to put a classified sticker on a Fed Ex envelope found in a suitcase which belonged to career criminal Tonya Tucker. (The envelope is listed by FBI Special Agent Bigham as #9 on the FBI Form 597.) (See Exhibit G -FBI Form 597) Special Agent 3

-------------

3 In United States v. Randall, f 71 F.3d 195,203 (4th Cir. 1999) The Supreme Court ruled that the Fifth Amendment's grand jury guarantee does not permit a defendant to be tried on charges that are not made in the indictment against him, and therefore, 'after an indictment has been returned its charges may not be broadened through amendment except by the grand jury itself. See United States v. Randall, 471 U,S. 130, 143 (1985). See United States v. Brady, 456 U.S. 152; and United States v. Young, 470 U.S. 1, 16 (1985).

Bigham testified she did not look at the papers while in Ford's home. She further testified the alleged papers seized were not photographed in Ford's home as required by procedures, but were photographed days later at an FBI facility. (See Exhibit H - Excerpt of Agent Bigham's Transcript Testimony)

DOJ prosecutors testified during the trial that it did not have any 'surveillance evidence' nor 'any eyewitness accounts' of Mr. Ford allegedly removing classified documents from NSA. Prosecutors should have dismissed all charges against Mr. Ford.

The 2nd count was Title 18 U.S.C. $ 1801 - Making A False Statement On A Government Form. Mr. Ford accepted employment with Lockheed Martin. Prosecutor David Salem had already gotten him fired from Northrop Grumman and after working for 3 weeks at Lockheed Martin, Salem was successful in getting him fired from there also. Ford truthfully provided Lockheed Martin a 1-1/2 page written account of alleged charges against him. At the trial, Judge Messitte allowed Prosecutor Salem to severely redact Ford's written statement. Salem told the judge the statement "prejudiced him". (See Exhibit I - E-Mail Dated 10129/2004 to Lockheed Martin) AUSA David I. Salem and DOJ National Security Division Trial Attorney Mariclaire D. Rourke testified that Mr. Ford backed his pick-up truck to the loading dock and loaded these papers into his truck.

In contradiction of their testimony, Mr. Ford's former NSA supervisor, Ms. Jacqueline Welch ("hereafter Jacqueline W") testified that she in fact had seen Mr. Ford on the day in question - December 19,2003 - standing in the parking lot beside his 'cream-colored 4 door sedan (car)'. Former Counsel on redirect, ascertained whether or not she knew the difference between a 'pick-up truck and a car . She affirmed that she did. Jacqueline W further testified that she never knew Mr. Ford had a pick-up truck. At that point, DOJ's over zealous prosecutors' alleged pick-up truck was referred to as a 'vehicle'. (See Exhibit J - Excerpt of Jacqueline W's Testimony)

Special Agent Michael L. Thompson admitted under oath that there were no fingerprints belonging to Mr. Ford found on any of the thousands of sheets of classified papers allegedly found in Mr. Ford's home. Once again, none of these alleged papers were listed on the FBI's official seized evidence Form 597. (See Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony)

F. Argument

Mr. Ford is the only American citizen in the history of the Espionage Act, to be charged, prosecuted and convicted under the statute without meeting the requirements of the statute. The United States Court of Appeals for the 4th Circuit recently upheld the requirements that in order to charge under the Espionage Act of 1917 - §793(e) one has to have the belief that what one is doing will harm the United States and/or help a foreign entity and one must have the intent to harm the United States and/or help a foreign entity. See United States v. Rosen and Weissman,557 F.2d 192 4th Cir.2009).

Judge Peter J. Messitte, during the suppression hearings, willfully discarded the requirement that the government had to prove the “belief” 'element. Judge Messitte, while charging the jury, willfully eliminated the need for the government to prove the element of "intent.”

Under the federal sentencing guidelines, espionage (Federal Criminal Codes §793(d) and (e) cannot be sentenced unless there is the element of transmittal. So, effectively, since a transmittal is a prerequisite for sentencing under §793(e), then without it, there cannot be a charge. The government never alleged Ford transmitted anything. As a matter of fact, NSA Security Officer Robert McCaslin sent a letter to Prosecutor David Salem dated 713112004 saying Ford's electronic equipment at work and at home were analyzed by NSA and were found to be clean. The letter was not allowed into the trial.

Subsequently, the "CIPA" Intelligence Authorization Act for 2001- Title VI §607 - Coordination Requirements Relating to the Prosecution of Cases Involving Classified information was totally ignored by Assistant United States Prosecutor David I. Salem and Dept. of Justice Trial Attorney Mariclaire D. Rourke.

The National Security Procedure Statute 9-90.020, provides that DOJ prosecutors had no authority to make decisions in this case. "CIPA" $607 - $1.1 of Executive Order No. 12958, provides that a Senior Official, the President of the United States, must be notified prior to prosecution. ln this case, that President was former President George W. Bush, Jr. - another statutory mandate ignored and violated in the matter of Kenneth Wayne Ford, Jr. $793(e) 'unauthorized possession' is contradictory to the National Security Act which provides that NSA employees have a life-time obligation and commitment regarding NSA classified documents.

G. Violation of Dept. of Justice Guidelines/National Security Procedures

DOJ's USAM guidelines regarding National Security Procedures §9-90.020 clearly dictates that the authority to conduct prosecutions relating to the national security lies with the Justice. USAM unequivocally states, in part that:

All prosecutions affecting, involving or relating to the national security, and the responsibility for prosecuting criminal offenses, such as conspiracy, perjury and false statements, arising out of offenses related to national security, is assigned to the Assistant Attorney General of the National Security Division or higher authority. See 28 C.F.R. S 0.61 The Counterespionage Section of the National Security Division, under the supervision of the Assistant Attorney General or higher authority, conducts, handles, and supervises prosecutions affecting, involving or relating to the national security." DOJ trial attorney Mariclaire D. Rourke and AUSA David I. Salem did not have authority to prosecute a National Security Espionage case against Kenneth Wayne Ford, Jr.

We recently reviewed Mr. Ford's court file. Although there are a few orders, from 8/2005 to 1112005, appearing in the case file that indicate the Assistant Attorney General was in compliance with that particular order, it is with great concern that we ask you to investigate this. We have no proof or certification that the Assistant Attorney General's alleged involvement with this case was authentic. As in other things involving Mr. Ford's case, we suspect this too is a fabrication.

H. DOJ Violated FISA Court Statutes

FISA Court specifically prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control).

FISA allows a federal officer, authorized by the President of the United States acting through the Attorney Gener4l to obtain from a judge appointed by the FISA Court, search warrants and approval of electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intelligence information. Mandated strict FISA Court procedures were ignored by the FBI, DOJ Prosecutors and U.S. District Court of Maryland Judge Peter J. Messitte, who is not an appointed FISA Court Judge.

Specifically, FISA requires that where the target of the search or surveillance is a "United States person" - a U.S. Citizen or permanent resident alien - the judge must find that the Executive Branch's certification that a significant purpose of the search or surveillance is to obtain foreign intelligence information is not "clearly erroneous". See 50 U.S.C. §1805 and 1824. Also see Brady v. Maryland, 373 U.S. 33 (1963); Strickler v. Greene, 119 S.T. 1936 (1999).

The elements of violations are: (1) the evidence must be favorable to the accused, either because it exculpates the defendant or because it impeaches the government; (2) the evidence must have been suppressed by the government, either willfully or inadvertently; and (3) prejudice must have been ensued. See Franks v. Delaware, 438 U.S. 154 (1978); See Brady v. Maryland, 373 U.S. 83 (1963); See USA v. Rosen & Weissman 05cr-225 (E.D.Va.)

We are not elected or high level corporate officials. We are "grass roots" people who are honest and hard working. President Obama stated at the 2009 NAACP 100th Anniversary celebration, that: "America is a place where, if you work hard, you can achieve success." A grave injustice has been done to a good American citizen (Kenneth Wayne Ford, Jr.). American citizens rely upon the United States Department of Justice to follow the rule of law.

In good faith, the initiation of a formal procedural investigation and the appointment of a Special prosecutor on behalf of our son, Kenneth Wayne Ford, Jr., is warranted and specifically should include an investigation of prosecutorial misconduct, violations of national security procedures, violations of FISA Court procedures, violations of issues in applying states secrets rules and the willful suppression of exculpatory affidavits and other exculpatory evidence in this case.

We are available at any time that is convenient to you to discuss this case. The elements in this letter by no means cover all the infractions against Mr. Ford. There were just too many illegal things done to put in a letter.

We seek an immediate vacation of Mr. Ford's conviction, full restoration of his revoked clearances and an immediate apology from the Department of Justice (DOJ).

Thank vou.

Sincerely,

Kenneth W. Ford, Sr.

Gloria D. Ford

EXHIBITS

l) Exhibit A - Rosenstein Press Release dated December 15, 2005

2) Exhibit B - Affidavits by SA Michael L. Thompson & SA Frederick C. Marsh and Tonya Tucker's Subpoenaed Cell Phone Records

3) Exhibit C - Tonya Tucker's threatening e-mail to Mr. Ford/Newly Discovered Evidence

4) Exhibit D - FBI Special Agent Dave Evans' Newsletter dated 3/31/2006

5) Exhibit E - Letter from Kenneth Wayne Ford, Jr. / Document of Events

6) Exhibit F - DOJ's Double Jeopardy Indictments; Docket of 11/28/2005

Indictment; Transcript Page of Dismissal of Original Indictment

7) Exhibit G - FBI Form 597 (Seized Items) w/ Computerized Listing Of Items

8) Exhibit H - Excerpt of Agent Bridget Bigham's Testimony

9) Exhibit I - E-Mail dated 10/29/2004 from Kenneth W. Ford, Jr. to Lockheed Martin

l0) Exhibit J - Excerpt of NSA Jacqueline Welch's Testimony

1l) Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony
      

President Obama, who prides himself as a constitutional scholar, having taught constitutional law at the University of Chicago, is about to become the subject of a major constitutional case in the indictment of Thomas Drake. Drake was not only exposing high level contract fraud involving two NSA directors -- Generals Michael Hayden and Keith Alexander -- but also allegedly involved a constitutionally-protected entity -- the press -- in making details of the fraud known to the American taxpaying public. Not since Watergate have the American people been subject to runaway surveillance by the NSA and FBI.

Obama, who supported retroactive immunity from prosecution for telecommunications companies that swept up the digital communications of all American after proclaiming he was against it, will be the person on trial in the Drake case. And Obama may very well end up like Richard Nixon if the government does not impose restrictions on the public's right to know through imposition of the draconian Classified Information Procedures Act and the State Secrets Privilege.

As one NSA insider tersely put it: "I truly believe that NSA has some illegally wiretapped information (big-time dirt) on Mr. Obama, and NSA has been using it (via blackmail) against him ever since he flip-flopped on the vote for retroactive immunity for the telecommunication firms that insisted they did nothing illegal when they joined in with the Bush administration in comprehensive, 'sea to shining sea' warrantless wiretapping of all domestic U.S. communications."

//////////

JANUARY 2011: January 10, 2011 -- NSA "Q Group" protecting sex scandals while plugging potential leaks - Wayne Madsen Report

WMR's intelligence sources report that the National Security Agency's "Q Group," the directorate responsible for overall security for NSA, is actively investigating and harassing NSA employees who have reported on senior officials at the sprawling intelligence agency, which now includes the new U.S. Cyber Command, of engaging in adulterous trysts with subordinates and possessing improper sexual material, including child pornography.

WMR has previously reported on the improper activities of the Q Group, which has become a virtual uncontrolled FBI within the NSA. Q continues to protect NSA senior officials who engage in and promote a culture of sexual exploitation of junior employees at the intelligence agency. Q Group has also misused NSA psychologists and psychiatrists to deem anyone who charges senior officials of the agency with sexual misconduct or harassment unfit to hold a security clearance for reasons of mental impairment.

On August 28, 2009, WMR reported: "NSA Security, headed up by Kemp Ensor III, and NSA medical worked in tandem to deny security access to employees determined to be mentally unfit to have access to classified information at NSA.

However, due to the attrition of highly-qualified personnel, the security-medical duo is now prescribing Prozac and Zoloft for NSA employees who refuse to fall into line. NSA is abuzz with the new requirement for employees to take what they call "happy pills."

The sexual harassment scene has also reportedly changed at Fort Meade. In the past, sexual harassment at NSA involved older male managers preying on young female employees. That has now changed in what has become an environment of 'do ask and do tell.' WMR has been informed that there is an increase in complaints about sexual harassment from new young male hires about being forced into 'kinky rendezvouses' with older male managers."

Q Group has also gone outside of its legal authority to harass the families and friends of former agency employees who have brought charges against NSA for sexual harassment and misconduct. WMR has learned of NSA personnel illegally masquerading as phone company technicians who entered the property of the family of one such ex-employee. In another case, Q Group personnel poisoned two pet dogs of the family of an ex-employee under NSA surveillance. Q Group personnel have also been used to harass the ex-spouses of senior NSA officials involved in child custody cases. WMR has also been informed that Q Group has harassed NSA employees who have married the ex-wives of NSA senior officials who have ongoing legal battles with their ex-husbands.

Q Group is able to conduct its harassment of civilians in the Fort Meade area with a "wink and a nod" from local law enforcement and other officials. NSA senior managers have dipped into NSA's substantial slush fund to lavish money on community service projects and programs in cash-strapped local municipalities and counties. The concept of the "friendly NSA that provides funds and jobs" has bought loyalty and silence from local and state of Maryland officials. In addition, WMR has learned that NSA has placed agents within the congressional offices of local members of Congress in order to interdict and retaliate against NSA whistleblower congressional complaints. The NSA "embeds," who work in concert with NSA's Office of Legislative Affairs, are found within the offices of Maryland Senators Barbara Mikulski and Ben Cardin, and Maryland Representatives C.A. "Dutch" Ruppersberger, Steny Hoyer, Elijah Cummings, Chris Van Hollen, and Paul Sarbanes, and is currently inserting an agent into the office of freshman Representative Andy Harris.

As discovered in a January 2005, Q Group Personnel Security organizational chart obtained by WMR, Q2 contains an office of counter-intelligence, which WMR has reported has been involved in illegal surveillance of individuals far beyond the NSA infrastructure.

Q2.jpeg

On July 3, 2009, WMR reported: "The Obama administration, rather than lessen the pressure on the NSA personnel, has turned up the heat and is resorting to even more draconian methods to ensure silence. The word from inside NSA is that a state of fear exists and the mission of the agency, to conduct surveillance of foreign communications to provide threat indications and warnings to U.S. troops and policy makers and protect sensitive U.S. government communications from unauthorized eavesdropping is suffering as a result." Our latest information is that the Obama administration is increasing pressure on NSA personnel to deter leaks.

Obama's Justice Department is now actively retroactively pursuing U.S. intelligence community leakers from the time of the Bush administration. Former CIA officer Jeffrey Sterling has been arrested and indicted for revealing information to New York Times reporter James Risen concerning Iran's nuclear program. Former NSA official Thomas Drake has been indicted by the Obama administration for leaking details on NSA contract fraud to reporter Siobhan Gorman of The Wall Street Journal and formerly of theBaltimore Sun. Former State Department analyst Stephen Kim has been charged with leaking top secret information on North Korean nuclear testing to Fox News.

WMR has learned from informed sources that the indictments of Sterling and Drake are just the beginning of the Obama administration's policy to crack down on leaks. With the tenth anniversary of the 9/11 attack coming up this year, the U.S. Intelligence Community, working closely with Mossad, have made plans to stop any new revelations that would point to high-level U.S. and Israeli government involvement in the 9/11 attacks. The Wikileaks affair was partly concocted to draw out and identify as many potential leakers as possible, including US Army Private Bradley Manning, now imprisoned at Quantico, Virginia on suspicions that he leaked classified documents to Wikileaks.

WMR has learned from an NSA source that this editor continues to remain a top priority for NSA electronic surveillance, including phone tapping and e-mail interception. NSA is also monitoring all those who are in communications with this editor via electronic means. WMR has previously reported on this web site's sources and contacts being major targets for NSA surveillance. Just as the latest report of NSA surveillance was received, this editor experienced a second-degree burn with blistering on the right neck and shoulder, usually where my cell phone is placed during conversations. The latest warning about NSA eavesdropping was received on January 8. The burn, that began as what can be described as a bad sunburn, began on the evening of January 6. The contour of the burn mark is oddly similar to the two equal halves of my flip-top telephone, with a white stripe in the middle where the hinge is located.


SDC10481.jpeg

Second degree burns on right shoulder and neck after latest warning of full-scale NSA surveillance.

WMR's foreign intelligence sources also report that there is an ongoing project by Israeli agents-of-influence in the United States to determine the sources of information on the 9/11 attacks. This project involves in-depth probes by the Israeli agents of retired Pentagon and FBI personnel believed to possess information about the U.S. and Israeli governments' involvement in the attacks. WMR can report that radio show host Alex Jones's information and funding sources are of particular interest to the Israeli cell.

///////////////////////

MARCH 2011: March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial - Wayne Madsen Report

In the trial of former National Security Agency (NSA) executive Thomas Drake, federal prosecutors have convinced an agreeable federal judge, Richard D. Bennett, to place under court seal previously-released trial documents because they have been deemed "For Official Use Only" or FOUO. Drake is accused of leaking classified materials to the media and is only the fourth person in U.S. history to be charged with violating the 1917 Espionage Act.

FOUO is not a national security classification and it never has been one, although there were attempts by the Reagan, George H W Bush, and George W. Bush administrations to create a "restricted" or "sensitive but unclassified" (SBU) national security classification immediately below the current lowest national security classification, which is Confidential. Expansion of national security classification categories beyond the current three -- Top Secret, Secret, and Confidential, in addition to Sensitive Compartmented Information (SCI) special access categories -- but these have been unsuccessful. George W. Bush's creation of a Controlled Unclassified Information (CUI) category was rescinded by Executive Order 13556 on November 4, 2010.

Although President Obama rescinded Bush's CUI presidential memorandum, federal prosecutors are trying to argue that CUI continues to exist as a national security classification under the guise of FOUO. The argument demonstrates a complete lack of understanding of the classification scheme used by NSA. However, in past trials, notable that of NSA analyst Kenneth Ford, Jr., jailed after a political show trial waged by DOJ neocons in league with a "shopped" federal judge. In the Ford case, the NSA wanted to cover up the cooking of signals intelligence from Iraq in order to justify the attack on and occupation of Iraq

However, NSA and Justice Department prosecutors are continuing to insist that FOUO is a security classification in the trial of Drake, however, NSA and DOJ decided to go after Drake because the documents he stands accused of passing to The Baltimore Sunpoints to massive misuse of taxpayer's money and contract fraud under the NSA directorships of retired General Michael Hayden and current director General Keith Alexander. Alexander is also the commander of the U.S. Cyber Command. The fraud committed by Hayden, Alexander, and senior NSA officials amounted to hundreds of millions of dollars in wasteful expenditures. In some cases, the waste on certain contractor-supplied intelligence systems were life threatening, as far as troops on the ground were concerned. The fraudulent contract expenditures were part of NSA's massive TRAILBLAZER and GROUNDBREAKER outsourced modernization and restructuring programs.

On March 18, in response to a request from federal prosecutors, Bennett sealed two documents that were previously available on the court's own website. The documents sealed describe the classified contents of several documents seized at Drake's home, however, the documents appear to be unclassified working papers that the government, after the fact, is trying to argue are classified at the levels of Secret and Top Secret.

Drake's federal public defenders have argued in one of the sealed documents that the government's argument that the documents found in Drake's home in flawed due to the fact that the documents could not be construed as classified at Secret or Top Secret merely because they contain the words "FOUO" and "COMINT." COMINT is communications intelligence and by itself does not mean that the document is classified at "Handle Via COMINT Channels Only," a special handling caveat for SCI special access categories. In fact, the National Cryptologic Museum, which is adjacent to NSA headquarters and open to the public, freely uses "COMINT" in its displays. In addition, the commercial International Spy Museum in downtown Washington, DC has held public seminars on issues dealing with, among other tradecraft, "COMINT."

From the sealed DOJ letter arguing that the documents found in Drake's home are classified, it is clear that NSA, which has played fast and loose with the truth in previous trials and administrative actions against its whistleblowing employees, has tried to re-classify previous unclassified "working papers" as being Secret and Top Secret to bolster its case against Drake.

WMR has previously obtained NSA contractor documents that were deemed by the contractor and NSA, itself, as unclassified and the Drake documents appear to fall within the same category. The unclassified documents that were re-classified as Top Secret and Secret have titles such as "Trial and Testing," "Collections Sites," "Volume is Our Friend," "What a Success," "Regular Meetings," "Shoestring Budget," "BAG," "Buy vs. Make," "TT Notes," "Terrorism Threat," "Note Card 1", "Note Card 2," and more intriguing, "9/11 Commission." WMR previously reported that NSA's security directorate, the "Q Group," has engaged in massive surveillance of employees and journalists, including this editor, to plug any leaks on NSA information on the 9/11 attacks. Bennett, in his ruling on March 18, agreed to NSA's and lead federal prosecutor William Welch II's request that previously unclassified court filings be placed under seal.

While NSA and DOJ seek to convict Drake for having unclassified For Official use Only documents in which the terms "FOUO" and "COMINT" appear, WMR has obtained a similar Unclassified For Official Use Only (FOUO) document written by Computer Sciences Corporation (CSC), one of the major contractors for the fraud-ridden GROUNDBREAKER program. In the document, from which WMR is providing excerpts, there are clearly many more NSA-unique systems and terms described.

Cover terms for classified NSA systems such as HIGHCASTLE, LOOKINGGLASS, MILENIUM, FAST TRACK, ROTUNDPIPER, and BRASSCOIN are listed, along with "SIGINT" or "Signals Intelligence," an NSA mission term comparable to the "COMINT" acronym found in the working papers confiscated from Drake's home.

The CSC document, maintained by CSC contractors and sub-contractors in their cars, briefcases, and homes, were never indicted by the Justice Department on grounds they violated national security. On the other hand, many at NSA feel that companies like CSC, SAIC, Northrop Grumman, Lockheed Martin, and others, should have been indicted for the massive contract fraud carried out under the watches of Hayden and Alexander.

In post-9/11 America, the whistleblowers to fraud, waste, and abuse stand accused of being criminals while the criminals rake in billions of dollars in taxpayers' money and are lauded as critical components of the "intelligence team."

NSA's GROUNDBREAKER and TRAILBLAZER contractors were eager to compile as many NSA systems and sub-systems as possible to cash in on the billions of dollars they could make from the NSA outsourcing work. The database that contained all the NSA systems, projects, and components ripe for outsourcing work was code-named JACKPOT. For CSC, SAIC, and certain NSA officials who spun through the revolving door after retirement and landed high-paying jobs with the contractors, it certainly was a JACKPOT and one that NSA, Q Group, the FBI, Department of Justice, and the White House earnestly want to cover-up in the trial of Thomas Drake.

During Drake's trial, which begins next month in Baltimore, FBI agents are expected to use code words to describe different aspects of the case. One code-word that will most definitely not be heard is JACKPOT, the database of NSA contracts in which contractors and NSA retirees enriched themselves -- criminality that is only met with chirping crickets from the so-called "crime fighting" Department of Justice and FBI.

//////////////

NOTE: Here is the resealed files mirrored on hongpong.com, bitchez: SUPPRESSED: DrakeNSA1-suppressed.pdf // DrakeNSA2-SUPPRESSED.pdf // UNCLASSIFIED FOUO NSA DOC:  UNCLASSIFIEDNSAdoc.pdf .

Walter from the Big Lebowski has a word for you Fed jokers that think they can control society through secrecy & bullying:

22881085.jpeg

/////////////

MAY 2011: May 24, 2011 -- 60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years - Wayne Madsen Report

CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency.

WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil."

NSA and selling the nation's prized secrets to contractors

June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.


But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

/////////////

SEPTEMBER 2011: September 26-27, 2011 -- A tale of two cases - Wayne Madsen Report

On June 15, U.S. federal judge Richard B. Bennett sharply rebuked federal prosecutors for pursuing a four-year Espionage Act violation investigation and case against former National Security Agency (NSA) official Thomas Drake. At Drake's sentencing hearing in Baltimore, Bennett called the four-year long case against Drake and the prosecutors' ultimate dropping of multiple espionage charges to a single misdemeanor count of unauthorized use of a government computer "unconscionable."

Drake had been charged with providing classified information to the Baltimore Sun in 2006 and 2007. He was specifically charged with violation of sub-paragraphs (d) and (e) of the Espionage Act, which covers "transmittal" of classified information to unauthorized parties. Charges under the 1917 Espionage Act have rarely been brought by the Justice Department. The law was used against American Israel Public Affairs Committee (AIPAC) officials Steve Rosen and Kenneth Weissman for receiving highly-classified information, including Sensitive Compartmented Information (SCI), from a Pentagon official. Charges against Rosen and Weissman were dropped by Eric Holder's Justice Department on May 1, 2009.

However, the "classified material" cited by prosecutors was not originally classified and it pertained to NSA officials, particuarly then-NSA director General Michael Hayden, defrauding the government for well over a billion dollars. Hayden and his advisers awarded a failed program called Project TRAILBLAZER to a group of contractors led by Science Applications International Corporation (SAIC).

The prosecutors, acting as virtual criminal racket protection agents for Hayden and his advisers, decided to retroactively classify the unclassified whistleblowing information in order to justify the Espionage Act charges against Drake. Hayden's pet project also assisted in the program to conduct warrantless wiretapping of communications of U.S. citizens, a super-classified operation known by the code name STELLAR WIND.

Drake avoided prison and Bennett ruled against federal prosecutor's wish to have a $50,000 fine imposed on Drake. In sentencing Drake to 240 hours of community service, Bennett said "There has been financial devastation wrought upon this defendant that far exceeds any fine that can be imposed by me. And I’m not going to add to that in any way.”



Drake was represented by two federal public defenders, James Wyda and Deborah Boardman. Drake's case began to fall party after it was featured on CBS "60 Minutes." Retired NSA officials, interviewed on camera, defended Drake and his whistleblowing actions. After the bad publicity for NSA and Eric Holder's Justice Department, the espionage charges against Drake were dropped.

Five years earlier, in another federal court room in Greenbelt, Maryland, and in a case even more egregious than the one involving Drake, federal judge Peter J. Messitte sentenced former NSA "Iraqi shop" signals intelligence analyst Ken Ford Jr., to six years in prison and no fine as a result of his politically-motivated conviction for allegedly removing two boxes of classified materials from NSA during broad daylight without detection. In fact, the documents were planted in Ford's Waldorf, Maryland home in retaliation for his signals intelligence analysis report casting doubt on the White House contention that Iraq possessed weapons of mass destruction. That report, which contained Ford's name as the preparer, eventually ended up on the desk of Vice President Dick Cheney. As a result, Ford became a target of the neo-con cell operating from within Cheney's office and the White House Iraq Group (WHIG), the same cabal that compromised Valerie Plame Wilson's covert identity and mission.

The team of Assistant U.S. Attorney David Salem; federal public defenders John Chamble, Andrea Callaman, and Susan Bauer; and even the private lawyer eventually retained by Ford, conspired to ensure that Messitte was successfully "judge shopped" as the trial attorney, that at least one dubious pro-NSA jury member was selected for the trial jury, and that Ford would receive anything but a fair trial. Unlike Drake, Ford served in a lower-level analyst position. However, Ford, an African-American who previously served as a uniformed U.S. Secret Service officer at the White House, was on a fast-track for an executive position at NSA.

"60 Minutes" never covered the Ford case, even though it was as, if not more, outrageous as the case brought against Drake. The Washington Post, rather than assign one of its national security correspondents to the case, handed it to a Metro desk reporter, who parroted in his articles what was given to him by the prosecution team.

Prosecutors never cited any classified document that was said to be in Ford's possession at the time of his arrest. Prosecutors relied on the testimony of a confidential informant named Tonya Tucker, who had several other aliases and a long criminal record, who said she saw a document labeled "classified" in Ford's home. Of course, "classified" is not a national security label or designator for any documents. Salem also charged that Ford was planning on meeting a foreign agent at Dulles International Airport to transmit documents. However, Salem could not identify the foreign country involved, a flight number, a rendezvous point, or any details of what amounted to a "pre-crime" allegation. In fact, Salem made up the entire Dulles story as a way to ensure a guilty verdict, especially considering that the jury was never shown any of the alleged classified documents that were said to be in Ford's possession. In the Drake case, the jury was shown copies of "retroactively" classified documents, which were originally unclassified.

Ford is now out of prison and serving three-years of restricted travel probation in Maryland. He maintains his innocence and intends to appeal his case. However, Ford's attempt to enlist the assistance of the parties who came to the defense of Drake have been unsuccessful. There is another problem with the Ford case. The Ford case files, including those maintained by the PACER system and the federal public defenders office in Washington, DC, have all disappeared. Even Ford's original birth certificate in the District of Columbia Vital Records Office has disappeared. The only information available on the Ford case from the Justice Department are the press releases issued on the case.

The federal public defenders office in Washington is clearly nervous about the double standard applied to Ford and Drake. Moreover, the supervisor of Ford's tainted public defenders in 2004 was Wyda, the same public defender who successfully argued Drake's case.

Former Justice Department prosecutor Thomas Tamm, under a long investigation for revealing the nature of NSA's warrantless wiretapping program to The New York Times, eventually saw his investigation by the FBI suspended. However, WMR has learned that the STELLAR WIND program was routinely violated by NSA employees. Hayden, who came up with the program and sold it to then-CIA director George Tenet and Vice President Cheney, essentially canceled the provisions of U.S. Signals Intelligence Directive 18 (USSID) 18, which governed the application of the 1978 Foreign Intelligence Surveillance Act (FISA) at NSA. NSA was prohibited from eavesdropping on "U.S. persons" without a court order from the Foreign Intelligence Surveillance Court (FISC). Under Hayden's tenure, some NSA analysts were conducting e-mail surveillance of their current and former girl friends, prompting Hayden to cover his tracks by implementing a procedure that saw database security officers, including those with oversight over the PINWALE e-mail interception database, conducting after-the-fact audit trail analysis for internal abuse of the new NSA powers.
fordfamily1.jpeg


Ken Ford, Jr. [center], reunited with his father and mother after six years of imprisonment on trumped up neo-con political charges stemming from the search for phony Iraqi WMDs.

Ford's case, which involved pressure from the Bush-Cheney White House, has also met with indifference from the Obama White House and the Congressional Black Caucus. Groups like the Government Accountability Project (GAP), which assisted with Drake's defense, did not raise a finger in the Ford case.

During his incarceration at Lewisburg federal penitentiary in Pennsylvania, Ford received rank-and-file support from some current and former NSA employees. However, unlike Drake, not one high-level NSA official, current or retired, came to Ford's defense, even though his innocence was as provable as that of Drake. It is, indeed, a "tale of two cases," one with a relatively happy outcome, the other singed with racism.


/////////////

JANUARY 2012: January 18-19, 2012 -- More high-level fraud at NSA uncovered - Wayne Madsen Report

WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.

When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.

There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.

At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.

The following press release was issued on May 12, 2005:

"Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . .

OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."



Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.

Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZER contract to SAIC. A less expensive signals intelligence re-engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.

Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.

One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."

Among the spin-offs of TRAILBLAZER was the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.

Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.

Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off."

/////////////

JANUARY 2012: January 18-19, 2012 -- FBI/NSA continue maintaining "mug shots" of journalists - Wayne Madsen Report

As WMR has reported in past articles, the National Security Agency (NSA) has maintained a series of "mug shots" of journalists it suspects have sources inside the NSA. Often, NSA personnel throught to have been speaking to journalists are called into NSA's "Q" security group and questioned on whether they have spoken to various journalists. Along with the names of the journalists, are photographs, described by NSA insiders, as "mug shots," likely culled from the Internet.

WMR previously reported on NSA's "rogue gallery" of journalists. From WMR, July 3, 2009: "Since the revelation of the NSA journalist monitoring database, which later added communications intercepts of journalist phone calls, emails, and faxes to its database, NSA Security has, according to information received by WMR, conducted physical surveillance of journalists it deems to be threats to the operations of the agency. The top targeted journalists, who make up a virtual 'rogues' gallery' at NSA Security, complete with photographs and other personal information, are: former Baltimore Sun and current Wall Street Journal reporter Siobhan Gorman, Washington Times reporter Bill Gertz, former Baltimore Sun and current New York Times reporter Scott Shane, Baltimore Sun reporter Phil McGowan, author James Bamford, New York Times reporters James Risen and Eric Lichtblau, and this editor, Wayne Madsen."

WMR has now learned from NSA sources that NSA and FBI counter-intelligence branches are maintaining "mug shots" of journalists. Two to three pages of journalists, along with their photographs, are known to be in the possession of FBI counter-intelligence agent Laura Pino and NSA counter-intelligence officer Ethan Andreas. Each page has two rows of photographs across with four photographs and names of journalists on each row -- a total of eight photographs and names per page. The number of journalists on the pages, therefore, could be between 16 and 24.

Three names are known to be on the pages maintained by the FBI and NSA, according to our sources: Siobhan Gorman, James Bamford, and this editor, Wayne Madsen. Gorman was believed to have been the journalist former NSA official Tom Drake was in contact with before he was criminally charges under various counts, including the the Espionage Act. Drake was a witness to high-level contract fraud and corruption within the NSA. WMR submitted a Freedom of Information Act request to NSA two years ago requesting information on the editor's photograph being used as a security warning device. After being granted expedited processing by NSA as news media for purposes of the FOIA request, NSA reversed course, denying us media status and then stonewalled responding to the request. [Related story today in WMR].


/////////////

JANUARY 2012: January 26-27, 2012 -- Obama administration assaults press freedom like no predecessor - Wayne Madsen Report

WMR has learned and has personally experienced the unprecedented assault by the Obama administration, aided and abetted by its intelligence and internal security infrastructure, on the First Amendment right of freedom of the press.

The Obama administration has indicted a total of six U.S. government employees with violating the arcane 1917 Espionage Act for allegedly communicating classified information to the press. The Obama administration, according to multi-agency U.S. government sources , has authorized the eavesdropping of journalists' e-mails, text messages, and phone calls to determine to whom they are in contact within the government, particularly in the Departments of State, Defense, Justice, the CIA, the U.S. Congress' intelligence oversight committees, and the National Security Agency (NSA). The NSA and FBI are also monitoring what websites are visited by government employees, including this one.

The six people charged under the Espionage Act with providing classified information to journalists (the "Obama Six") are:

  • John Kiriakou, former CIA, allegedly passed information on waterboarding torture tactics and the identity of a CIA torturer to someone identified by the government as "Journalist A." The chief government prosecutor is U.S. Attorney for Northern Illinois Patrick Fitzgerald, who WMR has identified as a cover-up prosecutor for the CIA ever since the days he suppressed critical intelligence in the trial of the "Blind Sheik," Omar Abdel Rahman, convicted for plotting the 1993 World Trade Center bombing and later, when he failed to bring Espionage Act charges against Dick Cheney chief of staff I. Lewis "Scooter" Libby in the Valerie Plame Wilson leak case. Fitzgerald also prosecuted former Illinois Governor Rod Blagojevich to protect the CIA's one-time agent, Barack Obama, Jr., from scandal arising from Obama's political and social activities in Chicago.
  • Jeffrey Sterling, former CIA, charged with providing The New York Times' James Risen with classified information on Iran's nuclear program.
  • Army Private First Class Bradley Manning, charged with providing over a quarter million State Department classified and unclassified cables from the SIPRnet communication system to WikiLeaks.
  • Thomas Drake, former NSA official, charged with providing classified information to journalists, including former Baltimore Sun reporter Siobhan Gorman. The charges against Drake were later reduced.
  • Stephen Kim, former State Department contractor, charged with leaking classified information about North Korea to Fox News' James Rosen.
  • Shamai Leibowitz, former FBI Hebrew translator, convicted of leaking classified FBI wiretaps to a blogger on Israeli intelligence activities in the United States directed at stirring up war fever against Iran. As yet, Leibowitz has been the only person convicted under the Espionage Act for leaking information to the media. The government fast-tracked the Leibowitz trial in order to supress coverage of Israel's massive intelligence operations in the United States.

WMR knows of six other ex-employees of NSA and the State Department who continue to face criminal probes by the Obama administration for leaking information to the press.

Government employees face constant monitoring of their government emails, as well as their personal e-mail accounts for any contact with the press. The FBI, NSA, and other agencies are also monitoring the web sites visited by government employees. At the State Department, lists of web sites visited by employees are maintained by the Diplomatic Security Service (DSS). DSS also maintains lists of charities to which State Department employees donate money.


WMR learned of one case where the U.S. Navy blocked access to the web for an employee who visited WayneMadsenReport.com from a government computer. The employee was required to explain to the system security administrator why WMR was visited and cautioned that WMR is on a "banned" list for Navy employees. At NSA, employees have been ordered not to disseminate any articles from WMR on the agency's internal e-mail system or they will face disciplinary action and possible loss of security access and their jobs.

There are also increasing reports that journalists' e-mails are being monitored or completely blocked by the U.S. government agencies and cooperating Internet Service Providers (ISPs). WMR has recently experienced such a denial-of-service by America On-Line (AOL).

The increased harassment of journalist sources by the Obama administration comes at the same time that Reporters Without Borders has dropped the United States on the World Press Freedom Index to 47 from 20 on the press freedom ranking list. At 47, the United States is tied with Romania and Argentina and ranks below the Union of Comoros in the Indian Ocean; increasingly fascist-oriented Hungary; Papua New Guinea, which has experienced a military coup; Mali; Tanzania; Botswana; Suriname; Niger; and Cape Verde. In 2002, during the second year of the Bush administration, the United States was ranked at 17.

///////////////

MARCH 2012: March 7-8, 2012 -- Justice Dept. prosecutor targeting whistle blowers and journalists has his own criminal history - Wayne Madsen Report

William Welch II was the chief of the Justice Department’s Public Integrity Section. While the title of his former office -- public integrity -- implies that Welch is dedicated to fighting corruption in the government, in President Obama's and Attorney General Eric Holder's Orwellian world of "Newspeak," Welch is the chief inquisitor of government whistle blowers and journalists who have communicated with them.

After committing ethical and legal violations in his investigation of the late Alaska Senator Ted Stevens, acts that resulted in criminal charges being dropped against Stevens and a criminal contempt of court investigation being opened against Welch, along with a Justice Department ethics probe, Welch continues to investigate national security whistle blowers. Welch has become a de facto special prosecutor, a modern day Juan de Torquemada, responsible for pursuing government "leakers" and journalists. Welch's targets have included National Security Agency fraud whistle blower Thomas Drake. He also has his sights set on former CIA officer Jeffrey Sterling and James Risen, the New York Times national security correspondent who Welch believes communicated with Sterling. Risen and the Times are fighting a subpoena for Risen to answer Welch's questions before a grand jury. Previously quashed by U.S. Judge for the U.S. District Court for Eastern Virginia Leonie Brinkema, the subpoena has been appealed by Welch and Holder to the U.S. Court of Appeals for the Fourth Circuit in Richmond, Virginia.

Welch and his team were also publicly berated by U.S. Judge Richard Bennett for faulty evidence against Drake who was being doggedly pursued by Welch for allegedly communicating with aBaltimore Sun reporter about billions of dollars in contract fraud committed at NSA, where Drake served in a senior executive position. Drake and veteran NSA colleagues found themselves being raided at gunpoint by FBI agents under Welch's supervision. Welch's case against Drake collapsed and in a plea agreement, all Welch could get from Drake's defense team was a guilty plea for a minor charge of misusing a government computer. Bennett rejected Welch's argument that Drake be given a $50,000 fine. Bennett said Welch put Drake through “four years of hell."

Bennett also criticized Welch for taking so long in bringing charges against Drake. Welch's case against Drake was conducted in anything but a speedy fashion. Welch's tactics included keeping potentially exculpatory evidence from Drake's defense team for months after the indictment was handed down. For over six months, Welch's team failed to produce evidence that one of the allegedly classified documents Drake was charged with improperly retaining was declassified two months after the indictment was issued.

Welch waited ten months to turn over evidence that another document that formed the basis of an Espionage Act charge against Drake had been - in the words of Drake's criminal defense team - “. . . published as 'unclassified' and had never been deemed 'classified' until after it was recovered from Mr. Drake's home.” The re-classification of previously de-classified documents is one of the tricks employed by the Holder Justice Department in pursuing leak investigations. Welch also informed Drake's criminal defense team that potentially exculpatory evidence relating to Drake's years-long cooperation with a Department of Defense Inspector General (DoD IG) investigation had somehow been "destroyed."

Welch has had a history with "destroyed" evidence. On December 1, 1996, Welch, who was then an assistant U.S. Attorney in Massachusetts and 33 years old, was stopped by the police on Route 10 in Southampton. Welch was arrested for driving under the influence of alcohol by a police officer after Welch failed four field sobriety tests. A special prosecutor was named in the case against Welch. According to the Union-News of Springfield, the prosecutor, Robert C. Bray, discovered that the police cruiser's video recorder failed to operate properly and the video tape could not be used as evidence against Welch. It also helped that Welch's father was Superior Court of Massachusetts judge William H. Welch. The senior Welch, who died in 2007, had been considered for four federal judgeships but was never nominated.

According to the Union-News, Southampton Police Lt. David Silvernail said that the video camera, which was purchased in November 1996 with federal grant money, 'went on when overhead cruiser lights were activated and was not supposed to go off until an officer shut it off.' Apparently, the camera had been shutting itself off after three minutes, but miraculously for Welch the problem was not discovered until Welch's arrest. 'The camera was sent back to its manufacturer to be fixed after the problem was found,' Silvernail
told the newspaper. The criminal case against Welch was dropped. The tape was later reused by Southampton police officers and the Welch arrest segment was erased.


williamwelch.jpeg


William Welch blows every case to which he is assigned. Perhaps he should blow into a plastic bag.


The story of William Welch is not an isolated one among Justice Department prosecutors. In Welch's case, someone who was so drunk he could not pass four sobriety tests on a Massachusetts highway is now entrusted by the Obama administration with the power to investigate those who challenge incompetence and wrongdoing in the U.S. intelligence community.

//////////////////////

END WAYNEMADSENREPORT.COM ITEMS >>>>

Whew.... All right. Now go read the Puzzle Palace and the Shadow Factory and everything you can find on Cryptome.org and PublicIntelligence.net about the NSA & Cryptography. GET [hash] CRACKIN!

By Anon request: A few loose ends on foreign espionage networks on the United States, Chicago false flag risks, Mr Veitch checks out, and the 9/11 mini-nuke theory that's out of bounds!

Time to check in with the Big Weird!

I was requested by some anonymous person to post this. I don't personally conclude that 9-11 was triggered by Mini-Nukes but it's interesting that videos featuring a Russian guy with that view named Dimitri Khalezov are automatically blocked from upload on youtube. I confirmed this auto-censorship back in February & re-encoded a video to get it to stick here: YouTube - ‪911 WTC nuclear demolition Dimitri Khalezov part01‏. Here's his site: Welcome to the personal web site of Dimitri A. Khalezov & video_Dimitri_Khalezov_911thology_download_links.

So here is our mysterious random submission...

This is the truth: The WTC was destroyed by 3 underground thermo-nuclear explosions. They were detonated by the US government who used this as an excuse to lead the US and its allies into invading Afghanistan and Iraq. All these wars and deaths were based on a lie.

Goebbels: “If you tell a lie big enough and keep repeating it, people will eventually come to believe it.”

Will you help to tell the truth to the world?

www.mathaba.net/news/?x=625926

www.911-truth.net/

Be sure to watch the 26 part video there.

#4 is on the built-in nuclear demolition scheme of the WTC

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part04.mp4

#14 in on Building 7, which collapsed even though no plane hit it.

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part14.mp4

#24/25 is on the chronic radiation sickness of the WTC responders)

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part24.mp4

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part25.mp4

www.youtube.com/watch?v=sNh1Isb20tw&feature=player_embedded

careandwashingofthebrain.blogspot.com/2011/05/911-comparing-building-implosions.html

Again I am not subscribing to this theory but it might be worth considering.
They also sent a pretty solid story about Phil Giraldi's efforts to flush out Israeli intelligence networks penetrating the US political system. Phil Giraldi Spills Beans on Israeli Espionage in America | Veterans Today. A quote from Jim Dean, editor at VT:

And when a lot of our young aspiring counter intel people learn that our political system protects Israeli espionage here, they leave government service in disgust, as have many of our best FBI people. It’s a national disgrace. They sold your country out from under you folks. And to get it back, they will need to be hunted down and removed…all of them who have worked with the Israelis. The numbers are huge and the names involved are big. So its not going to be pretty. And if you haven’t figured it out already, they have tons of money, their own private intelligence resources, and they are not going out quietly. They have bet you will be the losers…and to date they have been correct.

Also a Giraldi presentation: Paying Off Israel’s Military Bills:

“The Israeli government is actively engaged in military and industrial espionage in the United States.” That was the conclusion of a Pentagon administrative judge in 2006. One very good reason why Israel should not receive billions of dollars in military assistance annually is its espionage against the United States. Israel, a Socialist country where government and business work hand in hand, has obtained significant advantage by systematically stealing American technology with both military and civilian applications. US-developed technology is then reverse engineered and used by the Israelis to support their own exports with considerably reduced research and development costs, giving them a huge advantage against foreign competitors. Sometimes, when the technology is military in nature and winds up in the hands of a US adversary, the consequences can be serious. Israel has sold advanced weapons systems to China that incorporated technology developed by American companies—including the Python-3 air-to-air missile and the Delilah cruise missile. There is evidence that Tel Aviv has also stolen Patriot missile avionics to incorporate into its own Arrow system and that it used US technology obtained in its Lavi fighter development program—which was funded by the US taxpayer to the tune of $1.5 billion—to help the Bejing government develop their own J-10 fighter.

The reality of Israeli spying is indisputable. Israel always features prominently in the annual FBI report called “Foreign Economic Collection and Industrial Espionage.” The 2005 report, for example, states:

“Israel has an active program to gather proprietary information within the United States. These collection activities are primarily directed at obtaining information on military systems and advanced computing applications that can be used in Israel’s sizable armaments industry.”

And also: Ex-CIA Phil Giraldi…The Proper Place for Americans | Veterans Today.

Our anonymous person added a link for this: Jimstonefreelance.com - Did the Dimona Dozen murder the Fukushima 50? & Goon Squad: 'Lucky' Larry's Chicago's Sears/Willis Tower Tenants are Moving out and it has an Asbestos Problem.

I don't really agree with the content at either of these, however there is an uptick in sketchiness & weird tea leaves for Chicago, so I hope that nothing bad befalls the good residents of the Windy City.

DC alternative journalist Wayne Madsen posted this back in April: April 14-15, 2011 -- UPDATE 1X. Sudden flurry of maritime lien activity in Chicago - Wayne Madsen Report

April 14-15, 2011 -- UPDATE 1X. Sudden flurry of maritime lien activity in Chicago
Maritime liens are filed on vessels for various reasons, including insuring cargo or for non-payment of stevedoring and other port fees. It is all fairly standard fare except for when a dozen or so Chicago and Illinois politicians and other officials file $100 million in maritime liens against the U.S. Department of Treasury.
WMR has discovered that although less than 100 maritime liens had been filed in Cook County since 1985, since March 28 of this year, 11 maritime liens have been filed in Cook County against the U.S. Treasury Department.
Such a development could be easily explained away, except when examining the names of the maritime lien filers in the order that they were filed. It is not known who some of the individuals are who filed the liens since March 28, but they are also listed:
W. Smith (unknown affiliation)Lisa Madigan (Attorney General of Illinois)C. Wallace (unknown affiliation)Richard Michael Daley (outgoing Mayor of Chicago)Chicago Police DepartmentThomas G. Byrne (Commissioner of the Chicago Streets & Sanitation Department; ex-Chicago Police Department)Catherine Hennessy (affiliation unknown, possibly Chicago Police Department)Pat Quinn (Governor of Illinois)Milton R. Sees (former Illinois Department of Transportation Secretary)Jesse White (Secretary of State of Illinois)Ernie Dannenberger (Director of Vehicle Service Department of the Illinois Secretary of State's office)
Filing maritime liens against the US Treasury Department might indicate the future movement of U.S. Navy and/or Coast Guard vessels into Chicago's ports. However, the question looms: As Rahm Emanuel prepares to take over as mayor of Chicago, why was there a sudden flurry of maritime liens filed by top city and state officials a few weeks after Emanuel captured the mayor's seat in the election? With 9/11 rogue Larry Silverstein owning the former Sears, now Willis, Tower; Sam Zell running the Chicago Tribune; Emanuel soon sitting in the mayor's office; and Chicago-based President Obama kicking off his re-election campaign, the seemingly innocent filing of liens may indicate that something else is afoot.
UPDATE 1: Although maritime liens represent a relatively specialized area of the law, the American Bar Association Journal from October 1957 stated in an article that a recognized maritime tax lien has priority over a federal tax lien. Maritime liens can also cover non-vessel property, including buildings.

Unfortunately Chicago is now slated for the G8/NATO summit in 2012, which will likely be another beta test for martial law in America hosted by FEMA, the Secret Service, and of course NORTHCOM (which will apply their shady contingency plans, USNORTHCOM CONPLAN 3501 / 3502 like they did at the 2008RNC & 2009 G20.) With Larry "pull it" Silverstein & Rahm Emanuel in the mix, things look chancy!

Charlie Veitch checks out of 9/11 skepticism: Another issue burbling up is the departure of one highly visible British lolcat, Charlie Veitch (part of the Love Police protest org), from 9-11 issues. Here's his video breaking off from the lolfleet. (reaction from Truthergirls was pretty good)

It's sort of odd for someone to oppose the 9-11 official story and then jump back aboard the fine ship HMS EstablishmentNarrative, but stranger things have happened. It prompted some people to conclude that either A) he's being tongue-in-cheek B) he's 'controlled opposition'. Here's one guy making a similar case earlier with hilarious narration - seems like BarbarianRebellion is a pretty solid dude.

It's too bad, I have followed a bit of Charlie's views in recent months. We can hope that prominent individuals speaking out against various establishment agendas like Veitch and Alex Jones aren't controlled opposition, or provocateurs placed to send us awry. Unfortunately I have bumped into far too many FBI operatives in recent years to have a non-jaded opinion about anyone.... sail on with your unique blend of ornery British weird politics Charlie, and don't let the documentation against the official story faze you, I guess.

It reminds me a bit of Michael Ruppert, who got kind of fed up with diverging & assorted weird 9/11 stories, even though Crossing the Rubicon still stands as an exceptionally strong & critical work against the official narrative. I find it a bit funny when people set out on Conspiracy Patrol, deeming the hairiest theories (namely, mini nukes, holograms, and the ever popular Space Lazors) Out of Bounds, saying we must keep our 9/11 Truth inquiries into certain avenues. If there is a vast 9/11 coverup still rolling along, surely its establishment controllers must chuckle over the spats and in-fighting that all detract from "decolonizing" our minds entirely :)

There are many other concerns out there today besides an absurdly shady and complicated terrorist attack in New York a decade ago. However it is one of those barometers that you have to place people by... Perhaps South Park was right & the 9/11 conspiracy was itself a government conspiracy :) Used to funnel our concerns into divided dead ends & so forth.

Till next time, keep ya tinfoil tuned to Nibiru!

March 22 mega-link dump: ChernobyLinks & Middle East twitter mil ops live feeds, Nuclear Annotations, CIA Facebook OnionLol; Syria videos & moar

A ton of the latest & greatest links to throw at ya, roughly themed out! First some Lols and things to check out:

CIA's 'Facebook' Program Dramatically Cut Agency's Costs | Onion News Network

Bloomberg's Winkler Discusses Fed Bank Loan Data Ruling - Video - Bloomberg

Granbury woman run over, killed by monster truck at Dallas strip club | Dallas | News fr...

In reversal, key fax allowed in ex-CIA agent case | ajc.com - Elderly Rightwing CIA Cuban terrorist Luis Posada Carriles is tangled up in Texas court for 1997 terror bombings.

This was pretty awesome: Owning the Weather (2009) - IMDb

/////////

Middle East scenes:

Libya: Sometimes It’s Right To Fight! « Liam Fox: Irreverence Cafe - a lot of people disagree w this idea!

...because of the hypocrisy factor in part: Bahrain and Yemen declare war on their protesters - Middle East, World - The Independent

Egypt State Security Officials Named // Flickr: The Piggipedia موسوعة الجلادين Pool

Live Blog Libya - March 22 | Al Jazeera Blogs - running Drupal!

Al Jazeera: Has the future arrived? - Opinion // AIPAC's newest strategy.

Livetweets and radioscanning: Larry Van Horn (MilcomMP) on Twitter // Gayle Van Horn (QSLRptMT) on Twitter // Shortwave Central // Milcom Monitoring Post: Monitoring Operation Odyssey Dawn - Update // Milcom Monitoring Post

FMC the Netherlands (FMCNL) on Twitter // Notes: Burhan Gharaibeh (burhanco) on Twitter

Listen: Secret Libya Psyops, Caught by Online Sleuths | Danger Room | Wired.com

Morocco I think: YouTube - مظاهرة في داعل درعا سوريا

Syria: Wave of unrest shakes Syria, crowds torch party HQ | The Raw Story // YouTube - شام - القامشلي - الأكراد يجيبون درعا نعم للحرية21-3-2011 // YouTube - شام - دمشق - اعتقالات الأموي 20-3-2011 // YouTube - شام - دمشق - اعتقالات الأموي 20-3-2011 // YouTube - شام - درعا 1 موكب تشييع الشهداء 20-3-2011

Disturbing as hell: US Army 'kill team' in Afghanistan posed with photos of murdered civilians | World news | The Guardian. This one is psyop jammed in the US eh?

IDF officers confirm special department created to monitor left-wing organizations - Haaretz Daily Newspaper | Israel News

Rap News reports on the uprisings in the Middle East and Midwest | Raw Replay

Yugoslavia, Iraq, Libya: beware the lies of March | Neil Clark | Comment is free | guardian.co.uk

Chossudovsky: Libya no-fly zone means war

Revolutionary Politics » Blog Archive » The Littlest Invasions, No-fly zones and covert ops are just as bad as large-scale interventions.

Kinda Nsfw: BeRNaNKaGeDDoN 2012 | zero hedge - in space no one can hear you print.

Interactive Timeline Of Middle-East/North Africa Turmoil | zero hedge

//////////////

ChernobyLinkS! Or tune in live: NHK WORLD TV on USTREAM: Official NHK WORLD TV live on USTREAM. NHK WORLD TV is an English language 24-hour international news and information channel. New...

Chernobyl design RBMK 1000:
chornobyl.gif

Chernobyl | Chernobyl Accident | Chernobyl Disaster

RBMK Reactors | reactor bolshoy moshchnosty kanalny | Positive void coefficient

.....MOAR LINX! BELOW THE FOLD.....

From the Internet Archives: My 2003 Interview with Rashid Khalidi on Middle East politics, Iraq, Palestine, Neo-Cons & beyond

Here's a nice find. In October 2003 I interviewed Rashid Khalidi for the Mac Weekly. It wound up on the website and eventually got deleted around 2006, but it was still in the Internet Archives Wayback Machine at http://web.archive.org/web/20060612202355/http://www.macalester.edu/week...

Overall I think this interview aged well, was it really more than seven years ago? In the last few days it's been great to see Khalidi appearing a couple times on MSNBC right before remarks from President Obama about Egypt. So here's the whole interview, with subjects like Israeli settlers, neo-con arcana, Muqtada al-Sadr before he became so well-known, etc. The linkage between neo-cons and the Israeli rightwing fringe Khalidi explained in this interview was cited & footnoted by James Bamford in 2004's "A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies," which was the first time (only time?) my scribblins have been footnoted in a serious book. (and it was awesome to randomly discover that one day, too!)

I'm leaving the weird HTML code from the Internet Archive / abandoned Mac Weekly site fragments for the archival awesomeness of it all. Enjoy!


themacweekly.com exclusive
Interview with Roundtable participant Rashid Khalidi

Rashid Khalidi is the Edward Said Professor of Arab Studies at Columbia University and director of Columbia’s Middle East Institute.
Inteview by Dan Feidt




Interview conducted October 10, 2003
 

DF: You said in your talk regarding Iraq that “there are much worse days to come.” What leads you to this?

RK: Several things. The first is that the Administration purposely had too few soldiers for the post-war, leading directly to a chaotic situation which resulted in the destruction of the organs of state. The occupation thereafter took a number of decisions which alienated the entirety of the armed forces, and the Baathist technocrats, without whom it would be almost impossible to run a modern state in Iraq.

Both of those decisions I think were essentially ideological. It’s understandable that they would have wanted to eliminate the party leadership, people involved in war crimes, people involved in crimes against humanity, people who carried out notorious human rights abuses.

But why a medical doctor, why a lab technician or a schoolteacher, a low-ranking member of the party should be removed just because she or he was a Baathist? Why the officer corps of the army or the conscript regular soldiers were all fired is inexplicable. All of these things led to a situation where instead of coming in with the potential goodwill the United States might have had with the removal of an unpopular regime, the United States has pretty much alienated a large proportion of the population.

In the case of the Sunnis, this has been exacerbated by the civil war that [Ahmed] Chalabi is trying to foment between the Shia, to whom he’s posing as the champion of, and the Sunnis. The United States is on the point actually, I’m afraid, of incurring hostilities of more than just a lot of disgruntled Sunnis, and former Baathists, former soldiers, and so on, a few jihadis and others who are coming in, but maybe also the largest single group in Iraq, which is the Shiites.
 

DF: What do you think is Ahmed Chalabi’s plan?

RK: Chalabi wants to make himself ruler of Iraq. He and his group have been trying since before the war to impose themselves as the natural rulers of Iraq. They tried to get the Pentagon to fly them in there, so they could take a picture-postcard role in the liberation of the country, so that they would be posed to be the sole group that would be the intermediary between the occupation authorities and the Iraqis. They are still trying to do this even though Bremer and more and more people in Washington are realizing how dangerous to the United States and to Iraq Chalabi probably is. But there is a factional battle going on in Washington over this issue and there is a battle going on in Iraq, with the Chalabi and his people trying to win over the Shia, and engage in what some people have called already a pogrom or purge of Sunnis. Not just Baathists, Sunnis. Bremer and some of the civilian occupation authorities, and also some of the uniformed military, are beginning to tell Washington in no uncertain terms that that this man has to be stopped.
 

DF: There have been a lot of violent incidents of in Sadr City recently, because the Americans have detained some clerics that follow Sadr. Is that a sign that the peace between the Shia religious groups and the United States is fraying?

RK: It is not clear whether in fact what the United States is doing with Muqtada al-Sadr—in this place called Sadr City which is named for a relative of his who was killed by the Baathists—is going to lead to alienation of the Shia from the United States. Sadr doesn’t represent all the Shia. He is one factional leader. He is charismatic, he is popular but there are a lot of other people there.

The big question is A: how alienated are people in Iraq going to be, Shia, by American actions and policies, and B: to what extent will the United States try to repair its relations with the Shia by making up to Iran. There is an important faction in our government which is trying to do that, just as there’s an important faction in the government trying to sabotage any such possibility. So stay tuned for where the arm wrestling in Washington will end up. That in turn will determine a lot of these things. If The United States totally alienates Iran then one of the few possible means of positively affecting the attitudes of Shia in Iraq will disappear.
 

DF: What do you believe are the central principles of neo-conservativism? Do you believe it carries an outer moral ideology for mass consumption, and an elite truth for the few?

RK: Yeah, Seymour Hersh in his articles in the New Yorker about these people has argued that these are people who studied under Leo Strauss or under disciples of Leo Strauss at the University of Chicago, people like Wolfowitz himself, [Pentagon policymaker] Abram Shulsky and others, and that they came away with a sort of neo-Platonic view of a higher truth which they themselves had access, as distinguished from whatever it is you tell the masses to get them to go along.

There is a certain element of contempt in their attitude towards people, in the way in which they shamelessly manipulated falsehoods about Iraq, through Chalabi. Chalabi, of course, being part of this group, having studied at the University of Chicago as well, although he was doing his mathematics Ph. D. when they were doing politics degrees.

But I wouldn’t entirely blame this on Strauss or poor Plato for God’s sake. The other thing I would say is that there is another element in some of them, of a belief in force, which doesn’t come just from Strauss and Wohlstetter, who was actually Wolfowitz’s dissertation supervisor. It comes from Strauss via Ze’ev Jabotinsky, the head of the Revisionist strand of Zionism, which was an extreme nationalism which very much believed in force. I think that that view is very widely spread among the neo-cons.

Now, what is their philosophy? ‘Peace through strength,’ whatever that means. Not making concessions to the enemy, treating the enemy as a symbol of absolute moral blackness, not seeing gray in any picture. If you want to describe them in broad brush strokes, that’s how I’d do it. They are people for whom reality is probably less important than their ideology, and their moral certitudes.
 

DF: Noam Chomsky used the phrase ‘re-Ottomanization’ to describe the neoconservative strategy towards the Middle East, which would involve breaking down the strong states into pieces, giving them regional warlords, with Israel as the hegemonic power. Do you believe there’s merit in that viewpoint?

RK: I think that’s what some of them want to do. I’m not sure that has anything to do with US policy. That’s their fantasy. That’s really what the Clean Break strategy, if you read it very carefully, amounts to. And they’ve argued this in other places. It’s not just one document you have to go on. But to what extent that is more than the wet dreams of a bunch of neoconservatives who love Israel—love a certain muscled, hegemonic Israel—is very arguable.

I wonder about the extent to which that has any influence on US policy. I think that the idea that you crush all the strong states in the Arab world and create a situation of total instability is not something that most American policymakers accept. So, you know, maybe some of them are trying to edge crabwise towards that end, but I don’t think in the larger scheme of things it has a whole lot of influence on US policy.
 

DF: A Frontline interview with Richard Perle was published with the documentary “Truth, War and Consequences.” He talked about the Pentagon’s Office of Special Plans, which reviewed intelligence on Iraq prior to the war. Perle said the office was staffed by David Wurmser, another author of the Clean Break document. Perle says that the office “began to find links that nobody else had previously understood or recorded in a useful way.” Were the neo-cons turning their ideology into intelligence data, and putting that into the government?

RK: I can give you a short answer to that which is yes. Insofar as at least two of the key arguments that they adduced, the one having to do the connection between the Iraqi regime and al-Qaeda, and the one having to do with unconventional weapons programs in Iraq, it is clear that the links or the things they had claimed to have found were non-existent. The wish was fathered to the reality. What they wanted was what they found.

It was not just the Office of Special Plans, or whatever. There are a lot of institutions in Washington that were devoted to putting this view forward. Among them, other parts of the bureaucracy, and the vice president’s national security staff.

The vice president’s chief of staff Lewis Libby is a very important member of the neo-con group. He and the vice president have created the most powerful national security staff that anybody has ever had in the office of the vice president. I’ve read published assessments, which say that this is actually more influential than Condi Rice’s staff, the real NSC. This is another center of these views.

And then there are the think-tanks—I would use the word ‘think’ in quotes—like the American Enterprise Institute, the Heritage Foundation, the Hoover Institution and so on, all of which are devoted to spreading similar ideas. Basically any fantasy that Chalabi's people brought in, “we have a defector who says,” was turned into gold by these folks.

We now know this stuff, with a few exceptions, to be completely and utterly false, just manufactured disinformation designed to direct the United States in a certain direction. Whether the neo-cons knew this or not is another question, but I believe Chalabi’s people knew it. I would be surprised if some of them didn’t know it.
 

DF: Defense Undersecretary for Policy Douglas Feith‘s former law partner Marc Zell is a leading Israeli settler, and also runs a law firm which is supposed to work with the Pentagon and Chalabi’s nephew to help international businesses set up in Iraq. Is there a connection to be drawn between Feith and the Israeli settler movement?

RK: Feith is a partner of Zell, and Zell is a leading settler. He lives in a settlement; he is an advocate of expansion of Israeli settlements in the occupied territories. He and Feith are ardent committed extremist Likud supporters, that is to say they support a policy of Israel’s expansion, they support a policy of crushing the Palestinians, they support the expansion of settlements.

I don’t know what Feith’s position is specifically, whether he’s a settler or in favor of settlements, but he’s published opinions before he went into government which are quite extreme, as far as that’s concerned.

I think the important thing is not that Zell is an Israeli or not an Israeli, or a settler or not a settler, as the fact that such views are now acceptable in the highest reaches of the US government. It used to be that settlements were considered illegal; it used to be that they were considered an obstacle to peace. Different presidents took different positions, but they were uniformly negative until this administration.

In this administration we have the Undersecretary of Defense, Feith, the number 3 guy, who’s in charge of the reconstruction of Iraq, publicly identifying with such views. And with this law firm, Feith and Zell, which is based in Israel, and its affiliate, which is busy doing this other stuff in Iraq.

The other thing that’s a little unseemly is something that Seymour Hersh has said about Richard Perle. It’s the inability of these people to see the moral problems of being in government and helping out your friends in the private sector. The vice president and Halliburton, Perle and Global Crossing, and all these dubious shady firms he was involved in, he was profiting from and which he was helping to profit because of his connections in the Pentagon. And Feith, he’s the viceroy of Iraq, you can call him whatever you want but he’s the man in charge in Washington—Bremer reports to him—his law firm is engaged in helping businesses do well in Iraq?

There’s a clear conflict of interest. If we had proper ethics codes, this would not be allowed. Nor would the vice president be able to help his Halliburton friends to get no-bid contracts in Iraq. Nor would Perle be able to do as he’s doing with a variety of business interests. Nor would Feith, but that’s another issue, that’s an ethics issue.
 

DF: Is there a sense with this administration that the so-called military-industrial complex is at the helm?

RK: Well, there’s three or four elements in this administration. The one that gets the votes is not the military-industrial complex or the neo-cons. The one that gets the votes is the southern, western, male Christian evangelicals. That’s the biggest electoral block. Those are people who may believe in the United States being a muscular power in the world, they may not really have time for black and white in international affairs, they may believe that international morality is simple, but they have an agenda which is largely domestic, and they are the people to whom the president looks for a certain core of his support.

There is then the good old rouged representatives of the military-industrial complex, where I would place people like Rumsfeld and Cheney. These are guys that have worked for big business all their lives, they are themselves big businessmen, Rumsfeld’s been on the board of a very large number of very large corporations, and Halliburton was headed by Cheney for many years. So we’re talking about people who really do fit into that category. And they are amply represented in the government.

The third group, and the least important, I would argue, is the neo-cons. They give a little intellectual ginger to this, they push things in the direction of Israel a little bit, they’ve played a particularly important role in the Pentagon and in the office of the Vice President, and to some extent in the National Security Council, where Elliott Abrams is the senior person on the Middle East. They even have people at the state department. But in political terms in the United States they are the least important.

They are important in terms of public opinion, however, because with outlets like Fox, the New York Post, the Chicago Sun-Times, and so on, they have very important access to those kinds of outlets. Murdoch’s papers, and Murdoch’s television networks, are the most important of them.
 

DF: Is Bush trapped in a kind of box which prevents him from understanding simultaneously the occupation, Arab nationalism, and the threat of the settlements, or is he just a pragmatic politician who recognizes that no one in America is going to hold him accountable?

RK: I would say the latter. I think the president is not a reflective intellectual man. He is not a well-read, learned man. He is not a worldly person. He is very smart though. I think he is a smart politician. In fact, I think one of his greatest assets is that people systematically ‘misunderestimate’ him, to use his expression. People underestimate George W. Bush.

I think that he has so far calculated that you could do a number of these things in foreign policy, either because they were popular, or because there would be no opposition. Until recently he was right, and I think the fact that it’s now clear, not so much on Arab-Israeli issues, but on Iraq, that public opinion has if not turned, at least ceased to be enchanted by those policies.

This may in turn impose a rethink on the Bush team. I think that people like Karl Rove, who is a very ideological person, are also only interested in getting re-elected, and they would sell their mothers, as would most politicians, to make sure that their president got re-elected.

And he may ditch people. He may fire Rumsfeld, he may fire Wolfowitz, and he may shake up some aspects of his administration if he realizes that this is going to be a hindrance to his re-election. I think that the reason you haven’t seen a change in this is that you haven’t seen a countervailing bloc.
 

DF: The first action the United States took after September 11 was the invasion of Afghanistan, deposing the Taliban with a coalition that they described as the Northern Alliance. Today, the situation has somewhat deteriorated. There isn’t a lot of control in the tribal areas, the Pushtun areas, and it seems the Taliban is ramping up for another offensive. Why did this invasion of Afghanistan fail?

RK: I’m not sure that it failed, in that its objective was to bring down that regime. It succeeded in doing that. It failed in the sense of securing a stable, secure Afghanistan, which wouldn’t be a threat to its neighbors, or a breeding ground (I don’t like the term breeding ground) or a base area for operations against the United States and other countries. In that sense it has failed. You still have groups operating there. I’m not sure they’re able to attack the United States from Afghanistan but then I’m not sure they attacked the United States from Afghanistan before either. There were certainly training camps there, but I don’t think those training camps were the real problem.

The real problem is this diversified underground network that’s established in which Afghanistan was just one link. The problem is that, as in Iraq, the only objective was military victory over the enemy in the field, and a subsidiary objective was winning a doctrinal war between Rumsfeld and the uniformed military. Rumsfeld wanted to change the nature of the American military. In one sense he’s right.

The United States military is configured to fight World War II, or World War III, which is the Cold War war that never came, thank God, on the plains of northern Europe or against the hordes of the Red Army somewhere in east Asia. It’s not configured for anything else, and Rumsfeld has tried mightily to change the configuration of the United States ground forces, in particular. And he has come up against enormous resistance.

So to him, the Afghan war was an object lesson in what can and should be done. Those were the two objectives: to defeat the enemy in the field, and you show the hidebound generals that the army should be flexible, light, fast, movable, and basically get rid of several divisions and several structures it has. By divisions I mean army divisions and by structures I mean all kinds of breakdowns between armor and Special Forces and so on.

Unfortunately, war is not just defeating the enemy in the field. War is achieving a political objective. Both in Afghanistan and Iraq the United States resoundingly and rapidly won the military campaign and Rumsfeld in both cases, I think, made his point brilliantly, that a lighter army could do things that the old-style army didn’t want to do and couldn’t do.

They are losing the war—I don’t want to say they’ve lost—because of their hidebound, stubborn persistent refusal to understand that you win by achieving a political objective.

The objective in Afghanistan would have been not just to defeat the Taliban regime, but to stabilize and normalize Afghanistan so that it never becomes again a base area for people like al-Qaeda. Similarly in the case of Iraq, to achieve a rapid, sustainable transition from a dictatorship to a regime that doesn’t threaten its neighbors and is representative.

Well, they say that’s what they’re trying to do, but the means that they’ve employed in Iraq and to some extent in Afghanistan, by being so light in terms of numbers, and by being so unilateral, have succeeded in alienating the very people you need to bring in.

By relying on the warlords they have succeeded in perpetuating the conditions that caused the problem in Afghanistan, or through the chaos that was created, have created new conditions that may be insuperable.

They may in fact not be insuperable, they may be insuperable, such that you will end up having a political defeat. But we’ll see. That’s what it looks like on the tenth of October. Things could get normalized by Christmas; things could get normalized by January. Things might look very different in both of those countries. I doubt it, but it’s certainly possible.
 

DF: In the totality of the Middle Eastern political situation, what aspects or factors give you the most hope? What factors to you are the most puzzling?

RK: I get the most hope from the resilience of civil society. Even in the most devastated parts of the Arab world—Palestinian society—NGOs, unions, universities, are still managing to survive and thrive against both the conditions of occupation, war, closure and deprivation, and the autocratic tendencies of the Palestinian Authority. You find that all over the Arab world and all over the Middle East; In Iran, in Turkey, all over the Middle East. Those to me are the most encouraging things.

I find the most puzzling the fact that no alternative to authoritarian governments, besides the Islamists, has emerged. Now, I understand where the previous alternatives to the status quo in the Arab world went. In the ‘30s, the ‘40s and ‘50s the alternatives to the status quo were radical nationalist, socialist, leftist and other groups, which then became the champions of what became a new orthodoxy when they took power.

So the Baath Party, the Arab nationalists, others of that ilk, took power in places like Yemen, Libya, Sudan, Algeria, Egypt, Syria and Iraq, or they formed the traditional opposition to monarchies. And then they in turn became sclerotic, conservative, autocratic, and a drag on their societies, which is what they are now.

The Baath regime in Syria is only marginally less bad than the former Baath regime in Iraq was. They’re terrible regimes. Those were radical alternatives to the status quo once, literally 50 or 60 years ago.

Now, what I find a little puzzling, is that outside of some human rights-based, and other groups within civil society, there's very little political alternative to the immobilism and the kleptocracy which dominates most governments in the Arab world, except the Islamists, and the Islamists don’t have an answer. Their answer is “Islam is the answer,” but Islam is not an answer.

That is a very narrow appeal; it appeals to a very limited number of people in most Muslim societies, in fact. You look at the numbers that HAMAS and other Islamist groups get in Palestine in polling, and on a good day they can reach the 20s, and on a really fabulous day they may hit 30%. But if you ask people about the core values they represent, and the kind of vision they have for a Palestinian state, most Palestinians can’t accept that.

There’s an inherent limitation because it is not an answer. The problem is that they are the only organized opposition to some of these regimes. The anger and the dissatisfaction and alienation that some people feel at unemployment, at poverty, at a lack of development, at theft, at corruption, and so on and so forth, has to find some outlet. The Islamists, for some people, are the outlet. So that’s the thing that puzzles me: where is the alternative?

It’s certainly not going to be American military intervention. That’s not going to solve the problems in the Middle East. That’s causes new problems.

But that leaves a legitimate question: what do you do about these miserable regimes? Because you’ve had democratic transitions in places people thought were totally immobile like Eastern Europe and Latin America.

Why is that not happening in the Middle East? It could be because of the continuing conflicts there, which reinforce the state. That’s the argument I made in my talk, that if we address that it wouldn’t solve the problem but it would make it easier to solve the problem. But that’s not a sufficient answer.

Statecraft Horrorshow! Wikileaks State Department Leakin Loose Top Sekrits PKK US sponsoring of terrorism to moaning about the French, what's next?

Ahk a quick link dump here. Wikileaks is expected to drop the big diplomatic cables starting with Der Spiegel . There's a new Wikileaks blog out there - Assange talked to some Arab reporters over videochat so apparently the fuzz hasn't gotten him yet. 2010-11-28: ARIJ Conference | WL Central . Livebloggin from teh france too ..

Maybe all launches here around 2200 GermanyTime? International - SPIEGEL ONLINE - Nachrichten

Wikileaks: The gathering storm - leaks leave US with few friends - Scotsman.com News

WikiLeaks And Its Brave New World - Radio Free Europe / Radio Liberty © 2010 - from the CIA

IB Times to publish papers on global corruption - nice framing :)

McClatchy - Diplomats bracing!

j|turn » Next Up: The “War on Journalism”? - crackdown time, you know they are seizing domains these days! RawStory - Homeland Security

For more info see RapGodfather.com! Watch out all yr DNS belong to Homeland Security New IPR Rap Forum Fusion Center! I gotta throw this in:

thugnificent-rapgodfather.jpg

It looks like PKK Turkish /Kurdish militants going to get spilled out. The long running Ergenekon Deep State Network and the likes of corrupt ex-State operative Marc Grossman exposed in all their perfidy? We could hope... But how many hilarious new drug conspiracies?

Australian - http://www.theaustralian.com.au/news/world/wikileaks-breaking-us-laws-over-documents-state-department-tells-julian-assange/story-e6frg6so-1225962292953?from=public_rss

BBC cautious nibbles

The UK D-Notice is a show all its own! Statecraft Horrorshow! Guido Fawkes blog with DNotice Email is Hilarious!

Sunday Telegraph UK Floats this Theory:

The Sunday Telegraph has learnt that the first tranche of documents, to be published in full tomorrow after an initial release tonight, are expected to feature "lively commentaries" by US diplomats on world leaders, including Nelson Mandela, Robert Mugabe, the Zimbabwean president, Hamid Karzai, the president of Afghanistan, and Libya's Colonel Muammar Gaddafi of Libya.

Coalition sources say Tuesday's haul will deal with North and South Korea, as well as Guantánamo Bay, while Wednesday's tranche will include comments on Pakistan and counter-piracy operations in Djibouti.

Thursday will see attention focus on the Canadians and their "inferiority complex" while corruption allegations in Afghanistan will be under the spotlight on Friday. Saturday will cover Yemen while next Sunday will see the focus shift to China.

Video: Alex Jones vs. Wikileaks. Why does Alex Jones attack Wikileaks? : conspiracy

MORE FUN STUFF for the moment....


Mish's Global Economic Trend Analysis: To Ireland With Love

Many countries researching Killer Robots.

Federal False Flag Somali Bombing "attempt" in Portland: Another great moment in synthetic terrorism NY Times official narrative.   / Feds: Sting snares man planning to bomb tree-lighting ceremony | KATU.com / YouTube - "F.B.I. Cultivated Him For 18 Months" //

PAREvolution.com has the goods from the Pennsylvania Security bulletin data. file = here // Ruffalo on terror watch list | Celebrities | Entertainment | Toronto Sun

lol pitchfork media

why not buy a mac?

Silence Jesse FeMACamp episode? Jesse Ventura’s “Police State” Episode featuring Alex Jones and “We Are Change” Edited out of existence at truTV | We Are Change / forum

Revolutionary Politics::Revolutionary Politics : BP oil spill incident commander dies in small plane crash in FL - More children from Gulf with health problems — “Big, gaping wounds all over feet and inside of elbows” (VIDEO) | Florida Oil Spill Law

A Double POMO Fed Quantitative Ceremonial Magic is scheduled too!

//////

As for this messy post, sorry - Data Dumps: The Bane of E-Discovery — Slaw :-D .... Let the Cables Begin!

Kanye West Masonic/Egyptian "Power"; Viktor Bout's Back Baby! Videobits, FDA criminal Pfizer shell company & newstuff

"In the threatening situation of the world today, when people are beginning to see that everything is at stake, the projection-creating fantasy soars beyond the realm of earthly organizations and powers into the heavens, into interstellar space, where the rulers of human fate, the gods, once had their abode in the planets.... Even people who would never have thought that a religious problem could be a serious matter that concerned them personally are beginning to ask themselves fundamental questions. Under these circumstances it would not be at all surprising if those sections of the community who ask themselves nothing were visited by `visions,' by a widespread myth seriously believed in by some and rejected as absurd by others."

--C. G. Jung, in Flying Saucers

Huge messy post of videos & linx to throw at ya... Even The Amazonian Tribe Losing Their Land To Drilling Hated Avatar | Best Week Ever
Marco Brambilla has a style for our time, no doubt about it. Before Kanye, he did this as a kind of hotel video mural:

Damn Kanye West video "Power" got some one hell of a Masonic/Egyptian thing going on, you don't want to miss this. Another excellent piece from VC....Kanye West's "Power": The Occult Meaning of its Symbols | The Vigilant Citizen:

So Kanye stands at the gateway between the corrupt world of the profane and the exclusive world of the illuminated, wearing a Horus pendant, an unmistakable symbol of the Mysteries. One might say: “Well maybe Kanye just likes Egyptian things.” Maybe so, but in the context of this video, where all details are important and extremely meaningful, Horus becomes another piece of this symbolic puzzle.
Horned Girls - The entrance of the gateway of pillars is guarded by two horned albino girls holding a staff. Their features are very reminiscent of depictions of Isis and Hathor, goddesses of ancient Egypt. Another allusion to Egyptian magic......

.......This “moving painting” is definitely a multi-layered artwork, with many levels of interpretation: the first level is a commentary on power by using timeless symbols taken from ancient art; the second level describes a Masonic initiation with a ritual murder and an imminent rebirth.

This video lasts a mere minute and forty-three seconds but it manages to give the viewers plenty to ponder on and many symbols to decode. Looking at its meaning from a pop culture point of view, it is interesting to note that this short-film, intended to be viewed by the general public (especially young people), describes the concept of power with overt Masonic symbolism and occult references. This causes the uninformed viewers to unconsciously associate those symbols with the concept of Power, while “those in the know” get the “insider’s wink” sent by this video. Power ultimately becomes another piece in the on-going process called the “Revelation of the Method,” where the true source of power gradually and subliminally reveals itself to the world and occult rituals take place right in front of the public’s eyes.

Fantastic stuff, shocking. Beat that, cults of yore!

Viktor Bout's back, baby!
This is one lolcat who knows way to much about everything going on, in re Afghanistan etc.

A ton of documentary evidence of Israeli espionage released @ Institute for Research on Middle Eastern policy -- all the deets on The Atlantic and the new push for Iran, awesomeness. All the documents are out! The Israel Lobby Swims The Atlantic by Grant Smith -- Antiwar.com // How propagandists function: Exhibit A - Glenn Greenwald.

This is great - NY Post spoof of Weekender Commercial. Might recognize some people :)

The NY Post's (unofficial) response to the New York Times Weekender commercial - watch more funny videos

David Icke says there is a Moon Matrix. Wow dude there wasn't too much soft sell in front of this one.

He takes the manipulation of the human race and the nature of reality to still new levels of understanding and he calls for humanity to rise from its knees and take back the world from the sinister network of families and non-human entities that covertly control us from cradle to grave.
David has moved the global cutting edge so many times since his incredible ‘awakening’ in 1990 and here he does it again - and then some.
His most staggering revelation is that the Earth and the collective human mind is manipulated from the Moon, which, he says, is not a ‘heavenly body’, but an artificial construct – a gigantic ‘spacecraft’ (probably a hollowed-out 'planetoid') – which is home to the extraterrestrial group that has been manipulating humanity for aeons.
He describes what he calls the ‘Moon Matrix’, a fake reality broadcast from the Moon which is decoded by the human body/mind in much the same way as portrayed in the Matrix movie trilogy. The Moon Matrix has ‘hacked’ into the human ‘body-computer’ system, he says, and it is feeding us a manipulated sense of self and the world 24/7.

All right here's something more serious. Pharmacia & Upjohn Co. Inc, 2007, FAKE PFIZER ILLEGAL OPS SHELL CORPORATION... Those people at the FDA let Pfizer set up a shell company to crush for illegal operations, because they recognized Pfizer's huge illegal activities would kill them by kickin em off Medicare/Medicaid. They set up a shell for the illegal marketing of Bextra for surgical pain, at double the max approved dose, 40mg. Criminal deviants!Feds found Pfizer too big to nail, so they looked the other way on massive fraud. WOW.

Great story from Princeton and a bit of Macalester, Elite Deviance and spoofing to get thru academia, scholarships & meritocracy: Lost in the Meritocracy - Magazine - The Atlantic
The Garbage patch Mapped, a Way Bigger Deal that Global Warming - Massive North Atlantic Garbage Patch Mapped | Wired Science | Wired.com // Holy rainbow! Rare Buddha's Halo appears over mountain in China | Mail Online // Woods Hole says oil trapped deep, degrading very slowly - The Boston Globe
You won't believe this - At last. Someone is standing up to the anonymous web trolls | Paul Harris | From the Observer | The Observer
Federal Helium Reserve cashing out way too fast!! Damn!!Nobel prizewinner: We are running out of helium - opinion - 18 August 2010 - New Scientist
Wikitime: New Statesman - Why WikiLeaks must be protected // Julian Assange: The end of secrets? - opinion - 16 August 2010 - New Scientist // Why won't the Pentagon help WikiLeaks redact documents? - Glenn Greenwald - Salon.com // Wikileaks Lawyer Says Pentagon Given Access to Unpublished Secret Documents - Newsweek // It all starts with http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.txt // More Wikileaks Vapid Media Froth
Michael Moore praises suspected WikiLeaks source | MichaelMoore.com
Kewl / funny video performance from the RNC8 Defense Committee: Pointing Out the Enemy: Resistance to Tyranny //Louisville: No One Expects the Conspiracy: Puppets and State Repression - Infoshop News

Guest Post: The Failure of the Second London Gold Pool | zero hedge:

It looks like the demise of the gold price suppression scheme is very close at hand. Over the years GATA has uncovered a lot of anecdotal and circumstantial evidence that the Western central banks have been dishoarding gold at an unsustainable rate in order to suppress the price. This is the first concrete evidence that, just as GATA has long been predicting, the gold price is set to blow up because physical demand for gold is overwhelming the manipulators’ ability, or willingness, to provide it.

Moar - Guest Post: Preserve and Protect: Mapping The Tipping Points | zero hedge // Visualizing America's Surging Personal Bankruptcy Filings | zero hedge // Second Hindenburg Omen Confirmation In As Many Days, Third H.O. Event In One Week Fun stuff - Policy Center - Ten Principles for Opening Up Government Information - SunlightFoundation.com

New frontiers of autism --2 Moms Reverse Autism in Sons - NaturalNews.tv it turns out that gluten free / casein free diets are doing wonders. This video is freaky but seems to have a happy ending. Reverse Autism Now | Learn How To Help Your Autistic Child Today

Our Views on Autism | Reverse Autism - interesting bits,,,,

The Sickness

Mainstream medicine defines autism most often as a brain disorder that affects 3 critical areas of development: communication, social, and creative or imaginative play. They don’t really talk about the “sickness” part. And by sickness, I’m talking about all of the things I saw happen to my son that had nothing to do with his brain. He stopped eating. He stopped talking. He stopped interacting. He went from a chubby little toddler to skin and bones with no muscle tone. He got dark rings around his eyes and started banging his head all the time. He wasn’t born like this, something had happened to him to make him sick.

Eventually, I found out that most people on the spectrum suffer from some, or all, of the following biological issues that have nothing to do with the brain:

  • Digestive Issues – Diarrhea and/or constipation
  • Highly Selective Diet – They only eat a few foods or food types
  • Yeast Overgrowth – An unhealthy imbalance of good and bad yeast
  • Nutrient Depletion/Poor Absorption – Alarmingly low levels of certain vitamins and minerals.
  • Heavy Metal Toxicity – Alarmingly high levels of heavy metals in body tissue.
  • Body Detoxification Issues – Spectrum kids have a harder time ridding their bodies of toxins.

Leaving that there for now... would be great to have these data principles for public health disclosure: Policy Center - Ten Principles for Opening Up Government Information - SunlightFoundation.com

More bits... Fidel Castro fascinated by book on Bilderberg Club - Yahoo! News //Sweden's Pirate Party to Host Wikileaks Servers | Digital Media Wire // From Blackstone to Bentham: Why Wrongful Conviction Is On The Rise // Who are The Other Guys? : Whistleblower Protection Blog //
BBC News - Fate of Universe revealed by galactic lens - lolcat neutrinos I expect...128865048419682268.jpg
More economic big bangs: Entering a Death Spiral?: Tensions Rise in Greece as Austerity Measures Backfire - SPIEGEL ONLINE - News - International // Desperate Dodd Grabbing at Straws to Stop Warren Nomination | Firedoglake // Pakistan floods satellite images compared | Fromtheold // Guest Post: What To Expect When You’re Expecting… Massive Defaults On Multiple Scales | zero hedge // Hello, We Lost Track of $25 Billion? | zero hedge // As Debate Over Bond Bubble Rages On, Gold Surges To Highest Since July 1 | zero hedge
A little Jung: I went looking for Jungian UFO material, just for lols - The Occult World of CG Jung | Features | Fortean Times  CG Jung Page - Archetypal UFO Research - An Introduction // UFOs & Alienz //Unidentified Flying Object (UFO) - New World Encyclopedia //Jung, C.G.; Hull, R.F.C., trans.: Flying Saucers: A Modern Myth of Things Seen in the Sky. (From Vols. 10 and 18, Collected Works).
Psychosocial Hypothesis

Carl Jung, the famous psychologist, theorized that UFOs might have a primarily spiritual and psychological basis. In his 1959 book Flying Saucers: A Modern Myth of Things Seen In The Sky, he pointed out that the round shape of most saucers corresponds to a mandala, a type of archetypal shape seen in religiousimages. Thus the saucers might reflect a projection of the internal desires of viewers to see them. However, he did not label them as delusion or hallucination; rather he suggested something in the nature of a shared spiritual experience.

Carl Jung & the UFO Phenomenon // LOL Erowid Ayahuasca Vault - Ayahuasca-Alien connection! Carl Jung and Terrence McKenna on the UFO phenomenon // Unusual events...

Meanwhile in Chicago - Boss // Publishing zine adventures: iprc « meow & meow
What is the Historical Context for the Kennedy Assassination? Shades of Oswald! Lee-Harvey-Oswald-Not-Guilty: Man Arrested for Two Murders in One Hour Killed in Police Custody - this site is run by someone that knew him apparently?
// Goodbye to All This: On Leaving True/Slant - Mark Dery - Doom Patrol: Annals of Our Age - True/Slant //Former Bolivian dictator arrested on exposure charge, government says - CNN.com

Round N round it goes, as we move ever further away from the Teh Big Bang....

LinkBatch for August 19th 2010: In-Q-Tel CIA front funded Google Earth; Insane Clown Posse; Microdrones; Fructose tumors; Hamid Gul

Let's start with the FDA's plan to kill everyone: Junk food-addicted rats chose to starve themselves rather than eat healthy food.

Kind of amazed that the Iraq 'combat mission' officially ended, as this seven-year epic dominated my college experience & well basically shaped a whole era. But did FOXnews even honorably observe the conclusion of the troops operations? How could they, when they can instead set fires and blather about Alaska oil pipelines?

I has a sad over this NYC mosque concerntrolling fauxtroversy. After all an urban area laden with knicknacks, fast food, gambling and strip clubz cannot be besotted by a JCC/YMCA like cultural center. Cultural arsonists & jacobins like Palin and Gingrich are quite depressing, but even worse it seems like the White House can't really work the daily news cycle.

Nice work: "Hallowed Ground" // The uplifting response to my Ground Zero post

CIA CASH CONDUIT - In-Q-Tel: CIA Venture Capital fund already funded Google Earth, formerly known as Keyhole. In-Q-Tel's tax return brags of developing, providing this software to the intelligence community. This is why Google Earth Server/Enterprise edition is now the 'keystone' of fusion center geospatial intelligence systems. Cryptome has their hilarious tax returns! cia-in-q-tel-06.zip // cia-in-q-tel-07.zip // cia-in-q-tel-08.zip

201008190425.jpg 201008190430.jpg

Check this lol fro the 2008 return page 38. This is your Google Earth to 'fuse data from maps, images, text and other sources" etc

201008190428.jpg

In-Q-Tel — News & Press - a cached 2003 press release via google-watch:

In-Q-Tel, a private nonprofit venture funded by the Central Intelligence Agency, today announced a strategic investment in Keyhole Corp., a pioneer of interactive 3D earth visualization. The investment, made in February 2003, was In-Q-Tel's first engagement with a company on behalf of the National Imagery and Mapping Agency (NIMA).

Also: CIA Invests in Open Source Lucene, Solr Search

Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring | dailyator.com:

The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future.

The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents — both present and still-to-come. In a white paper, the company says its temporal analytics engine “goes beyond search” by “looking at the ‘invisible links’ between documents that talk about the same, or related, entities and events.”

******

Quick Hits from STELLAR WIND NSA eavesdropping program: You can Tap a Blago But You Can't Convince A Jury It's For Realz: Behind the legal fight over NSA's "Stellar Wind" surveillance, ‘Stellar Wind’ routinely eavesdropped on journalists and public officials, Analysis: Speculation rife about NSA’s STELLAR WIND project | intelNews.org, NSA’s meta-data email surveillance program exposed. Meanwhile also: Unnecessary lies: A whistleblower's perspective on Necessary Secrets.

Pretty good Debordian view of the spectacular fear process: t r u t h o u t | States of Paralysis: America's Surrender to the Spectacle of Terror // also OMG a revisiting of torturing small kids with tons of LSD for MKULTRA: t r u t h o u t | The Hidden Tragedy of the CIA's Experiments on Children! Wow.

Economics: Ex-Reaganite notes the pocalypse! Op-Ed Contributor - Four Deformations of the Apocalypse - NYTimes.com. Don't miss the Hindenburg Omen that caught big buzz in recent days -- technical indicators of a crash. Boston Fed’s New Excuse for Missing the Housing Bubble: NoneOfUscouddanode « naked capitalism. FT.com / Technology - US matches Indian call centre costs. Entering a Death Spiral?: Tensions Rise in Greece as Austerity Measures Backfire - SPIEGEL ONLINE - News - International

Sparkin up Prop19: Rolling Stone has some nibbles. Expect turnout! Good ol California Uber Alles himself, Jerry Brown, declared "We've got to compete with China... And if everybody's stoned, how the hell are we going to make it?" Drug War Victims - Drug WarRant

High Fructose Corn Syrup shown to turbocharge replication of pancreatic cancer cells: 'Fructose-Slurping' Cancer Could Sour the Soda Business - DailyFinance // Cancer cells slurp up fructose, US study finds | Reuters: "Tumor cells thrive on sugar but they used the fructose to proliferate. "Importantly, fructose and glucose metabolism are quite different," Heaney's team wrote." No surprise that different chemicals prompt wayward cells like tumors to behave differently. There's more to treating tumors than chemical warfare & tons of radiation. New study: 85% of Big Pharma's new drugs are "lemons" and pose health risks to users. YUCK!

Local Hacklabz & Resilient Communities: get constructive with the new spiffy parts fabber in a shipping container! RESILIENT COMMUNITY: Forget Afghanistan, These are Needed in Detroit etc. && LOL GLOBAL GUERRILLA: Julian Assange. Moar Hackerspaces! hackerspaces like these - JOURNAL: Forget Silicon Valley and Wall Street.

Kroll Spy Coverup Ops escalate: Journalist Exposes How Private Investigation Firm Hired by Chevron Tried to Recruit Her as a Spy to Undermine $27B Suit in Ecuadorian Amazon. Earlier: Cherkasky Buys Back Sleuthing Firm Kroll from Company That Fired Him. This new company is called Altegrity, and also has US Investigative Services, the main gatekeeper for federal security clearances. Sounds like a terrifying new private equity complex. Kroll, long known as the CIA of Wall Street, also epically failed to secure the WTC facility (and thus would have enabled the spiez to plant thermite in the Towers or whatever).

Faveblogz: BlackListed News // Cryptogon.com // The Agonist . Sads: Pakistan: Over four million rendered homeless by floods, says UN. Radioactive Smoke from Fires in Chernobyl Fallout Zone. Companies Rush to Issue Riskier Debt as Investors Look for Higher Returns. Mind-Controlling Parasites Date Back Millions of Years | Bizarre Parasite Fungus | LiveScience

Great analysis on Sic Semper Tyrannis including Sic Semper Tyrannis : Of Chess and Baseball - David Habakkuk, illustrating how if Iran didn't command Hezbollah to retaliate after an Israeli airstrike, it would be a hell of a good chess move. Also Sic Semper Tyrannis : The Old and The New - Sale

Just add settler bits: The right's latest weapon: 'Zionist editing' on Wikipedia - Haaretz. Al-Manar AKA the Hezbollah news site, sez Al-ManarTV:: Israel-US Increase Military Cooperation, Hold Joint Exercises 15/08/2010.

Establishment == Sugarcoating Dismal Realities: Porno for Pessimists - BlackListed News. FBI issues more top secret clearance for terrorism cases - USATODAY. Tales from Stasiland: The letter that makes you disappear—By Scott Horton (Harper's). Conservative kiddos try to sing, get repressed & resist. Way to learn! The Return Of Civil Disobedience | Personal Liberty Digest: "This is America, we sing the national anthem. Who says on the Lincoln Memorial we can’t sing the national anthem, that’s what I want to know?” I don't agree that Lincoln was a "tyrannical dictator" compared to the slave masters, but hey I'm just a Yank.

UK noise grows over murdered Mr Kelly: Dr David Kelly was on a hitlist, says UN weapons expert as calls grow for full inquest | Mail Online

MicroDronez! I want! JOURNAL: When Drones Prank. OMG LOL AR.Drone.com – Parrot Wi-Fi quadricopter. Augmented Reality games on iPhone, iPod touch & iPad // Check it: microdrones GmbH | your eye in the sky

Hamid Gul is a lolcat! The Pakistani ex-ISI honcho gives a really good interview on Alex Jones.

Asset forfeiture sucks: The Government's License To Steal - Reason Magazine
Insane Clown Posse, magic magnets and feces: Insane Clown Posse: a magnet for ignorance... "Juggalo culture is what happens when hip-hop settles in the poverty-stricken cities and suburbs of America's rust belt."
Wow.. Seriously I had no idea all this was going on, I've ignored the whole thing, though recently heard about how ICP was actually a weird Christian indoctrination trick & the Dark Carnival motif was essentially a honeypot to get yokels into Christ. However they have apparently foisted a really bad movie, Big Money Rustlas (2010) / wiki . All this time I didn't understand where wiggers and their apparent subtype, juggalos, came from. Wow... And it's all due to Detroit. Look at all the merch.
ICP fans cause hardship in Hardin County. Who can dispute they are the most degenerate cultural force in America? Insane Clown Posse: Tila's Beatdown Was Her Own Fault and after attacking Tila Tequila they pegged Method Man, who will sue. Insane Midwestern Clown-Rap Fans Claim Second Victim // Was Tila Tequila Attacked with Feces by Raging Juggalos? (Yes. Updated). And Gawker also informs us American Apparel is going broke so their news isn't all disgusting.
ICP is a strange, strange thing which exalts violent ignorance - see Double Rainbow Guy and The Insane Clown Posse, in re "Fucking magnets, how do they work? // And I don’t wanna talk to a scientist // Y’all motherfuckers lying, and getting me pissed
In this, as in all things, I must support WU TANG. Nothin to fuck with! These bastards blamed Tila. (statement) How did this website get designed? Worst of all, Coolio got a tattoo in homage to these people and Juggalo is spelled wrong.
******Few more final bits: In Twist, Nonprofits Honor Technology’s Failures - NYTimes.com. Fun sites: The Top 100 Web Sites of 2010 - Undiscovered: Info | PCMag.com. CNSNews.com - EXCLUSIVE: Arizona Sheriff: Border Patrol Has Retreated from Parts of Border Because It’s ‘Too Dangerous’. What? Robert Lanza, M.D.: Does the Past Exist Yet? Evidence Suggests Your Past Isn't Set in Stone. Tell that to the debt collectors! Hm re Franken: The Mirthless Senate - Opinionator Blog - NYTimes.com, based onFilibusters and arcane obstructions in the Senate : The New Yorker... Nice articles. Till next time, unless they hit the kill switch!

Syndicate content