and you'll receive our popular
newsletter with latest news,
videos, commentary & more.
Help Us Spread The Word!
HELP US GO VIRAL!!!!
We no longer have the
luxury of time.
Guest Users: 9
Intel Agencies: CIA, NSA (38)
Please Support Us With A Purchase
We have no control over
what ads google displays
Please Support Us With A Purchase
By Wayne Madsen
August 9, 2014
by Wayne Madsen
(WMR)—The Islamic State of Iraq and the Levant (ISIL), which also calls itself the “Islamist State” and is led by former Abu Ghraib prison detainee Abu Bakr al-Baghdadi, released from U.S. detention in 2004, would not be in existence had the CIA abandoned its policy of creating Islamic extremist groups to sow dissension in the Middle East.
After training and arming Sunni Islamist guerrillas in Turkey, Jordan, and post-Muammar Qaddafi Libya to overthrow Syrian President Bashar al-Assad, CIA- and Saudi-nurtured jihadist insurgents have taken over large portions of eastern Syria, northern Iraq—including Kurdish regions—and are now moving into Lebanon. Targets of the ISIL forces are Kurds, Yazidis, Turkomans, Assyrian and Chaldean Christians, and Shi’a Muslims. These minority religious groups are witnessing their members being slaughtered and their religious shrines and places of worship destroyed by the ISIL radicals who hew to the Wahhabist line dominant in Saudi Arabia.
Islamist mercenaries from the West would not be flocking to join the ranks of ISIL if it were not for the support given them by Saudi national security adviser Prince Bandar bin Sultan, whose fingerprints are all over the 9/11 false flag attack on the United States. Nor would Kurdish towns and dams on the Euphrates River be falling to ISIL forces if it were not for the tacit support given umbrella jihadist guerrilla groups in Syria, Iraq, and Turkey by CIA Director John Brennan. Brennan is probably the only senior member of the Obama administration who has been to Islam’s holiest shrine in Mecca, something that is only permitted for devout Muslims or “special guests” of the Saudi monarch. Brennan is a former CIA station chief in Riyadh and he is a confirmed Saudophile, a close friend and supporter of the misogynistic and arcane Saudi kingdom.
Brennan’s operations on behalf of anti-Christian and anti-Shi’a Islamist radicals would not have been possible without the diplomatic cover provided to him by the female duo of National Security Adviser Susan Rice and UN Ambassador Samantha Power, both students of the George Soros “responsibility to protect” (R2P) school of thought. R2P, in reality, is nothing more than a baked-over neoconservative interventionist foreign policy trimmed with “humanitarian” intentions.
A Review of The Phoenix Program by Douglas Valentine
By Kevin Ryan
June 29, 2014
Douglas Valentine’s The Phoenix Program is vital for understanding the history of terrorism and its role in political warfare. Few other historical accounts provide as much detail on how the U.S. government and the CIA began to use programs for counterterrorism to implement political policy through secretive, coldblooded actions. Understanding such history is critical to making sense of what is happening in our world today.
Although implemented as a means of countering terrorism, Valentine shows how the Phoenix Program was in practice a CIA-controlled campaign of terror in Vietnam. Hidden behind terms like pacification and neutralization, Phoenix implemented a program of terror and psychological warfare against the civilian population. Under the guise of counter terrorism, tens of thousands of civilians were kidnapped, tortured, and murdered.
Valentine explains how the purpose of Phoenix was to terrorize the people into submission, not only causing them to fear any possible association with the enemy but also as a means to crush dissent. Unfortunately for many Vietnamese peasants, they were caught in a world in which they were terrorized by both sides in the long-lasting conflict. Using psychological warfare techniques, Phoenix promised to protect the people from terrorism while simultaneously terrorizing them.
The book describes the history of the program well. Phoenix and its precursor ICEX aligned the CIA-supported Provincial Reconnaissance Units (PRUs) with police and paramilitary programs to create a system for capturing or killing suspects in targeted ways. Once captured and brought in for interrogation, the suspect was as good as dead. The growing fear of this program led to further abuses including false accusations and payoffs. The contractor Pacific Architects and Engineers built interrogation centers in every province and doubled as an employment front for other CIA operatives.
April 13, 2013
The critical “Heartbleed” bug reported earlier this week to have affected the security of most of the internet was discovered by researchers at the United States National Security Agency two years earlier, according to a new report.
On Friday afternoon, Bloomberg News journalist Michael Riley reported that the NSA knew about the monstrous flaw for at least two years ahead of this week’s announcement, but kept it hidden from technologists and instead exploited it to hack the computers and correspondence of certain intelligence targets.
Earlier in the week, the open-source OpenSSL internet security project issued an emergency advisory after discovery of the Heartbleed bug revealed a weakness that may have for years allowed hackers to access online information otherwise thought to be protected by the SSL/TLS encryption standard used by around two-thirds of the web.
21st Century Wire says…
The United States spy-state has continued to grow since Edward Snowden first jumped into the lap of the Guardian…
Although Snowden’s revelations were detailed and in the public interest, the jury is still out regarding the authenticity of his maverick status. The political system wants the public divided over Snowden - while turning a blind eye to Snowden’s peculiar background, which could have been used as a legitimate operation to demonize whistleblowers, as well as help create a larger security apparatus.
Was Wikileaks used in a similar manner?
It’s really hard to get a grip on Snowden’s cult of personality, especially since Bradley (Chelsea) Manning was given 35 years for handing over information to Wikileaks that was also deemed sensitive in nature to the United States. We have been told by many proponents of the NSA that Snowden’s docu-dump was the most “damaging” thing to happen to the country’s national security.
If this is the case, then why has Snowden been used to polarize the masses and Manning denounced for his actions?
August 23, 2013
from the and-we're-just-now-telling-congress dept
So, this week, we wrote about the NSA quietly admitting that there had been intentional abuses of its surveillance infrastructure, despite earlier claims by NSA boss Keith Alexander and various folks in Congress that there had been absolutely no "intentional" abuses. Late on Friday (of course) the NSA finally put out an official statement admitting to an average of one intentional abuser per year over the past ten years. The AP is reporting that at least one of the abuses involved an NSA employee spying on a former spouse. Meanwhile, the Wall Street Journal suggests that spying on love interests happens somewhat more often:
The practice isn’t frequent — one official estimated a handful of cases in the last decade — but it’s common enough to garner its own spycraft label: LOVEINT. A handful is still significantly more than once. And it's a lot more than the "zero" times we'd been told about repeatedly by defenders of the program.
While the NSA says it takes these abuses seriously, there's no indication that the analyst was fired.
July 9, 2013
The fact that mass spying on Americans isn’t necessary to keep us safe is finally going mainstream.
The top counter-terrorism czar under Presidents Clinton and Bush – Richard Clarke – says:
The argument that this sweeping search must be kept secret from the terrorists is laughable. Terrorists already assume this sort of thing is being done. Only law-abiding American citizens were blissfully ignorant of what their government was doing.
If the government wanted a particular set of records, it could tell the Foreign Intelligence Surveillance Court why — and then be granted permission to access those records directly from specially maintained company servers. The telephone companies would not have to know what data were being accessed. There are no technical disadvantages to doing it that way, although it might be more expensive.
Would we, as a nation, be willing to pay a little more for a program designed this way, to avoid a situation in which the government keeps on its own computers a record of every time anyone picks up a telephone? That is a question that should have been openly asked and answered in Congress.
William Binney – the head of NSA’s digital communications program – says that he set up the NSA’s system so that all of the information would automatically be encrypted, so that the government had to obtain a search warrant based upon probably cause before a particular suspect’s communications could be decrypted. But the NSA now collects all data in an unencrypted form, so that no probable cause is needed to view any citizen’s information. He says that it is actually cheaper and easier to store the data in an encrypted format: so the government’s current system is being done for political – not practical – purposes. Binney’s statements have been confirmed by other high-level NSA whistleblowers.
By Jon Rappoport
June 29, 2013
Every director of the NSA is a general or an admiral.
The NSA is organized under the US Dept. of Defense.
Imagine that you are a powerful player who straddles two worlds—the Dept. of Defense and the private sector where corporate defense-contractors live and flourish.
You’ve served many times in both arenas. Your name is Mr. Military Industrial Complex.
Your mission is war.
The reasons for war don’t matter. Reasons can be invented at the drop of a hat. You want endless armed conflict.
That’s how you make your money. That’s how you express your impulses. That’s your single obsession. That’s how you forward Empire.
You don’t have to justify what you do or consult your conscience. Those days, if they ever existed, are long past. You’re a war-monger and you’re proud of it.
Your basic challenge, on behalf of the military industrial complex, is working the political machinery in Washington—the Congress, the president, the two major Parties—in order to make war happen.
One day, you look around and you say, “I have a whole super-agency at my disposal. It’s organized under the Dept. of Defense. It-called the NSA. It spies on everybody all the time.”
You realize you can use the NSA to collect endless amounts of information on Congress, the White House, the president, the press, and the Democratic and Republican leadership.
Well, the NSA is already doing that.
First | Previous | 1 2 3 4