"In a time of universal deceit telling the truth is a revolutionary act." -George Orwell

Posts Tagged ‘U.S. Covert Operations’

Peeling The Onion: Almost Everyone Involved In Developing Tor Was (Or Is) Funded By The US Government

In Uncategorized on July 21, 2014 at 11:35 pm

tor-privacy-roger-dingledine-nsa-pentagon

Oldspeak: “None are more hopelessly than those who falsely believe they are free-Goethe.

YEEEESH…  i can’t say i’m surprised.  i’m more gullible than i thought.  Turns out TOR was/is a great way for governments to identify and track people who value their anonymity .  And was developed originally for spooks. Needless to say, don’t use Tor if you want to communicate and browse the internet securely. Or maybe this story is bullshit too, who the shit knows at this point. Le Sigh… ” -OSJ

By Yasha Levine @ Pando:

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”

—Roger Dingledine, co-founder of the Tor Network, 2004

***

In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity.

Internet privacy activists and organizations reacted to the news with shock. For the past decade, they had been promoting Tor as a scrappy but extremely effective grassroots technology that can protect journalists, dissidents and whistleblowers from powerful government forces that want to track their every move online. It was supposed to be the best tool out there. Tor’s been an integral part of EFF’s “Surveillance Self-Defense” privacy toolkit. Edward Snowden is apparently a big fan, and so is Glenn Greenwald, who says it “allows people to surf without governments or secret services being able to monitor them.”

But the German exposé  showed Tor providing the opposite of anonymity: it singled out users for total NSA surveillance, potentially sucking up and recording everything they did online.

To many in the privacy community, the NSA’s attack on Tor was tantamount to high treason: a fascist violation of a fundamental and sacred human right to privacy and free speech.

The Electronic Frontier Foundation believes Tor to be “essential to freedom of expression.” Appelbaum — a Wikileaks volunteer and Tor developer — considers volunteering for Tor to be a valiant act on par with Hemingway or Orwell “going to Spain to fight the Franco fascists” on the side of anarchist revolutionaries.

It’s a nice story, pitting scrappy techno-anarchists against the all-powerful US Imperial machine. But the facts about Tor are not as clear cut or simple as these folks make them out to be…

Let’s start with the basics: Tor was developed, built and financed by the US military-surveillance complex. Tor’s original — and current — purpose is to cloak the online identity of government agents and informants while they are in the field: gathering intelligence, setting up sting operations, giving human intelligence assets a way to report back to their handlers — that kind of thing. This information is out there, but it’s not very well known, and it’s certainly not emphasized by those who promote it.

Peek under Tor’s hood, and you quickly realize that just everybody involved in developing Tor technology has been and/or still is funded by the Pentagon or related arm of the US empire. That includes Roger Dingledine, who brought the technology to life under a series of military and federal government contracts. Dingledine even spent a summer working at the NSA.

If you read the fine print on Tor’s website, you’ll see that Tor is still very much in active use by the US government:

“A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.”

NSA? DoD? U.S. Navy? Police surveillance? What the hell is going on? How is it possible that a privacy tool was created by the same military and intelligence agencies that it’s supposed to guard us against? Is it a ruse? A sham? A honeytrap? Maybe I’m just being too paranoid…

Unfortunately, this is not a tinfoil hat conspiracy theory. It is cold hard fact.

Brief history of Tor

The origins of Tor go back to 1995, when military scientists at the Naval Research Laboratory began developing cloaking technology that would prevent someone’s activity on the Internet from being traced back to them. They called it “onion routing” — a method redirecting traffic into a parallel peer-to-peer network and bouncing it around randomly before sending it off to its final destination. The idea was to move it around so as to confuse and disconnect its origin and destination, and make it impossible for someone to observe who you are or where you’re going on the Internet.

Onion routing was like a hustler playing the three-card monte with your traffic: the guy trying to spy on you could watch it going under one card, but he never knew where it would come out.

The technology was funded by the Office of Naval Research and DARPA. Early development was spearheaded by Paul Syverson, Michael Reed and David Goldschlag — all military mathematicians and computer systems researchers working for the Naval Research Laboratory, sitting inside the massive Joint Base Anacostia-Bolling military base in Southeast Washington, D.C.

The original goal of onion routing wasn’t to protect privacy — or at least not in the way most people think of “privacy.” The goal was to allow intelligence and military personnel to work online undercover without fear of being unmasked by someone monitoring their Internet activity.

“As military grade communication devices increasingly depend on the public communications infrastructure, it is important to use that infrastructure in ways that are resistant to traffic analysis. It may also be useful to communicate anonymously, for example when gathering intelligence from public databases,” explained a 1997 paper outlining an early version of onion routing that was published in the Naval Research Labs Review.

In the 90s, as public Internet use and infrastructure grew and multiplied, spooks needed to figure out a way to hide their identity in plain sight online. An undercover spook sitting in a hotel room in a hostile country somewhere couldn’t simply dial up CIA.gov on his browser and log in — anyone sniffing his connection would know who he was. Nor could a military intel agent infiltrate a potential terrorist group masquerading as an online animal rights forum if he had to create an account and log in from an army base IP address.

That’s where onion routing came in. As Michael Reed, one of the inventors of onion routing, explained: providing cover for military and intelligence operations online was their primary objective; everything else was secondary:

The original *QUESTION* posed that led to the invention of Onion Routing was, “Can we build a system that allows for bi-directional communications over the Internet where the source and destination cannot be determined by a mid-point?” The *PURPOSE* was for DoD / Intelligence usage (open source intelligence gathering, covering of forward deployed assets, whatever). Not helping dissidents in repressive countries. Not assisting criminals in covering their electronic tracks. Not helping bit-torrent users avoid MPAA/RIAA prosecution. Not giving a 10 year old a way to bypass an anti-porn filter. Of course, we knew those would be other unavoidable uses for the technology, but that was immaterial to the problem at hand we were trying to solve (and if those uses were going to give us more cover traffic to better hide what we wanted to use the network for, all the better…I once told a flag officer that much to his chagrin).

Apparently solving this problem wasn’t very easy. Onion router research progressed slowly, with several versions developed and discarded. But in 2002, seven years after it began, the project moved into a different and more active phase. Paul Syverson from the Naval Research Laboratory stayed on the project, but two new guys fresh outta MIT grad school came on board: Roger Dingledine and Nick Mathewson. They were not formally employed by Naval Labs, but were on contract from DARPA and the U.S. Naval Research Laboratory’s Center for High Assurance Computer Systems. For the next several years, the three of them worked on a newer version of onion routing that would later become known as Tor.

Very early on, researchers understood that just designing a system that only technically anonymizes traffic is not enough — not if the system is used exclusively by military and intelligence. In order to cloak spooks better, Tor needed to be used by a diverse group of people: Activists, students, corporate researchers, soccer moms, journalists, drug dealers, hackers, child pornographers, foreign agents, terrorists — the more diverse the group that spooks could hide in the crowd in plain sight.

Tor also needed to be moved off site and disassociated from Naval research. As Syverson told Bloomberg in January 2014: “If you have a system that’s only a Navy system, anything popping out of it is obviously from the Navy. You need to have a network that carries traffic for other people as well.”

Dingledine said the same thing a decade earlier at the 2004 Wizards of OS conference in Germany:

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, ‘Oh, it’s another CIA agent.’ If those are the only people using the network.”

The consumer version of Tor would be marketed to everyone and — equally important — would eventually allow anyone to run a Tor node/relay, even from their desktop computer. The idea was to create a massive crowdsourced torrent-style network made up from thousands of volunteers all across the world.

At the very end of 2004, with Tor technology finally ready for deployment, the US Navy cut most of its Tor funding, released it under an open source license and, oddly, the project was handed over to the Electronic Frontier Foundation.

“We funded Roger Dingledine and Nick Mathewson to work on Tor for a single year from November 2004 through October 2005 for $180,000. We then served as a fiscal sponsor for the project until they got their 501(c)(3) status over the next year or two.  During that time, we took in less than $50,000 for the project,” EFF’s Dave Maass told me by email.

In a December 2004 press release announcing its support for Tor, EFF curiously failed to mention that this anonymity tool was developed primarily for military and intelligence use. Instead, it focused purely on Tor’s ability to protect free speech from oppressive regimes in the Internet age.

“The Tor project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online,” said EFF’s Technology Manager Chris Palmer.

Later on, EFF’s online materials began mentioning that Tor had been developed by the Naval Research Lab, but played down the connection, explaining that it was “in the past.” Meanwhile the organization kept boosting and promoting Tor as a powerful privacy tool:

“Your traffic is safer when you use Tor.”

Playing down Tor’s ties to the military…

The people at EFF weren’t the only ones minimizing Tor’s ties to the military.

In 2005, Wired published what might have been the first major profile of Tor technology. The article was written by Kim Zetter, and headlined: “Tor Torches Online Tracking.” Although Zetter was a bit critical of Tor, she made it seem like the anonymity technology had been handed over by the military with no strings attached to “two Boston-based programmers” — Dingledine and Nick Mathewson, who had completely rebuilt the product and ran it independently.

Dingledine and Mathewson might have been based in Boston, but they — and Tor — were hardly independent.

At the time that the Wired article went to press in 2005, both had been on the Pentagon payroll for at least three years. And they would continue to be on the federal government’s payroll for at least another seven years.

In fact, in 2004, at the Wizards of OS conference in Germany, Dingledine proudly announced that he was building spy craft tech on the government payroll:

“I forgot to mention earlier something that will make you look at me in a new light. I contract for the United States Government to built anonymity technology for them and deploy it. They don’t think of it as anonymity technology, although we use that term. They think of it as security technology. They need these technologies so they can research people they are interested in, so they can have anonymous tip lines, so that they can buy things from people without other countries knowing what they are buying, how much they are buying and where it is going, that sort of thing.”

Government support kept rolling in well after that.

In 2006, Tor research was funded was through a no-bid federal contract awarded to Dingledine’s consulting company, Moria Labs. And starting in 2007, the Pentagon cash came directly through the Tor Project itself — thanks to the fact that Team Tor finally left EFF and registered its own independent 501(c)(3) non-profit.

How dependent was — and is — Tor on support from federal government agencies like the Pentagon?

In 2007, it appears that all of Tor’s funding came from the federal government via two grants. A quarter million came from the International Broadcasting Bureau (IBB), a CIA spinoff that now operates under the Broadcasting Board of Governors. IBB runs Voice of America and Radio Marti, a propaganda outfit aimed at subverting Cuba’s communist regime. The CIA supposedly cut IBB financing in the 1970s after its ties to Cold War propaganda arms like Radio Free Europe were exposed.

The second chunk of cash — just under $100,000 — came from Internews, an NGO aimed at funding and training dissident and activists abroad. Tor’s subsequent tax filings show that grants from Internews were in fact conduits for “pass through” grants from the US State Department.

In 2008, Tor got $527,000 again from IBB and Internews, which meant that 90% of its funding came U.S. government sources that year.

In 2009, the federal government provided just over $900,000, or about 90% of the funding. Part of that cash came through a $632,189 federal grant from the State Department, described in tax filings as a “Pass-Through from Internews Network International.” Another $270,000 came via the CIA-spinoff IBB. The Swedish government gave $38,000, while Google gave a minuscule $29,000.

Most of that government cash went out in the form of salaries to Tor administrators and developers. Tor co-founders Dingledine and Mathewson made $120,000. Jacob Appelbaum, the rock star hacker, Wikileaks volunteer and Tor developer, made $96,000.

In 2010, the State Department upped its grant to $913,000 and IBB gave $180,000 — which added up to nearly $1 million out of a total of $1.3 million total funds listed on tax filings that year. Again, a good chunk of that went out as salaries to Tor developers and managers.

In 2011, IBB gave $150,00, while another $730,000 came via Pentagon and State Department grants, which represented more than 70% of the grants that year. (Although based on tax filings, government contracts added up to nearly 100% of Tor’s funding.)

The DoD grant was passed through the Stanford Research Institute, a cutting edge Cold War military-intel outfit. The Pentagon-SRI grant to Tor was given this description: “Basic and Applied Research and Development in Areas Relating to the Navy Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance.”

That year, a new government funder came the scene: Swedish International Development Cooperation Agency (SIDA), Sweden’s version of USAID, gave Tor $279,000.

In 2012, Tor nearly doubled its budget, taking in $2.2 million from Pentagon and intel-connected grants: $876,099 came from the DoD, $353,000 from the State Department, $387,800 from IBB.

That same year, Tor lined up an unknown amount funding from the Broadcasting Board of Governors to finance fast exit nodes.

Tor at the NSA?

In 2013, the Washington Post revealed that the NSA had figured out various ways of unmasking and penetrating the anonymity of the Tor Network.

Since 2006, according to a 49-page research paper titled simply “Tor,” the agency has worked on several methods that, if successful, would allow the NSA to uncloak anonymous traffic on a “wide scale” — effectively by watching communications as they enter and exit the Tor system, rather than trying to follow them inside. One type of attack, for example, would identify users by minute differences in the clock times on their computers.

The evidence came out of Edward Snowden’s NSA leaks. It appeared that the surveillance agency had developed several techniques to get at Tor. One of the documents explained that the NSA “pretty much guaranteed to succeed.”

Snowden’s leaks revealed another interesting detail: In 2007, Dingledine gave at a talk at the NSA’s HQ explaining Tor, and how it worked.

The Washington Post published the NSA’s notes from their meeting with Dingledine. They showed that Dingledine and the NSA mostly talked about the technical details of Tor — how the network works and some of its security/usability tradeoffs. The NSA was curious about “Tor’s customers,” and Dingledine ran down some of the types of people who could benefit from Tor: Blogger Alice, 8 yr. old Alice, Sick Alice, Consumer Alice, Oppressed Alice, Business Alice, Law Enforcement Alice…

Interestingly, Dingledine told the NSA that “the way TOR is spun is dependent on who the ‘spinee’ is” — meaning that he markets Tor technology in different ways to different people?

Interestingly, the Washington Post article described Dingledine’s trip to the NSA as “a wary encounter, akin to mutual intelligence gathering, between a spy agency and a man who built tools to ward off electronic surveillance.” Dingledine told the paper that he came away from that meeting with the feeling that the NSA was trying to hack the Tor network:

“As he spoke to the NSA, Dingledine said in an interview Friday, he suspected the agency was attempting to break into Tor, which is used by millions of people around the world to shield their identities.”

Dingledine may very well have been antagonistic during his meeting with the NSA. Perhaps he was protective over his Tor baby, and didn’t want its original inventors and sponsors in the US government taking it back. But whatever the reason, the antagonism was not likely borne out of some sort of innate ideological hostility towards the US national security state.

Aside from being on the DoD payroll, Dingledine has spends a considerable amount of his time meeting and consulting with military, intelligence and law enforcement agencies to explain why Tor’s so great, and instructing them on how to use it. What kind of agencies does he meet with? The FBI, CIA and DOJ are just a few… And if you listen to Dingledine explain these encounters in some of his public appearances, one does not detect so much as a whiff of antagonism towards intelligence and law enforcement agencies.

In 2013, during a talk at UC San Diego, Dingledine cheerfully recalled how an exuberant FBI agent rushed up to thank him during his recent trip to the FBI:

“So I’ve been doing a lot of talks lately for law enforcement. And pretty much every talk I do these days, sone FBI person comes up to me afterwards and says, ‘I use Tor everyday for my job. Thank you.’ Another example is anonymous tips — I was talking to the folks who run the CIA anonymous tip line. It’s called the Iraqi Rewards Program…”

Dingledine’s close collaboration with law enforcement aside, there’s the strangely glib manner in which he dismissed news about the NSA hacking into Tor. He seemed totally unconcerned by the evidence revealed by Snowden’s leaks, and played down the NSA’s capabilities in his comments to the Washington Post:

“If those documents actually represent what they can do, they are not as big an adversary as I thought.”

I reached out to Dingledine to ask him about his trip to the NSA and whether he warned the Tor community back in 2007 that he suspected the NSA was targeting Tor users. He didn’t respond.

How safe is Tor, really?

If Dingledine didn’t appear to be fazed by evidence of the NSA’s attack on Tor anonymity, it’s strange considering that an attack by a powerful government entity has been known to be one Tor’s principle weaknesses for quite some time.

In a 2011 discussion on Tor’s official listserv, Tor developer Mike Perry admitted that Tor might not be very effective against powerful, organized “adversaries” (aka governments) that are capable monitoring huge swaths of the Internet.

“Extremely well funded adversaries that are able to observe large portions of the Internet can probably break aspects of Tor and may be able to deanonymize users. This is why the core tor program currently has a version number of 0.2.x and comes with a warning that it is not to be used for “strong anonymity”. (Though I personally don’t believe any adversary can reliably deanonymize *all* tor users . . . but attacks on anonymity are subtle and cumulative in nature).

Indeed, just last year, Syverson was part of a research team that pretty much proved that Tor can no longer be expected to protect users over the long term.

“Tor is known to be insecure against an adversary that can observe a user’s traffic entering and exiting the anonymity network. Quite simple and efficient techniques can correlate traffic at these separate locations by taking advantage of identifying traffic patterns. As a result, the user and his destination may be identified, completely subverting the protocol’s security goals.”

The researchers concluded: “These results are somewhat gloomy for the current security of the Tor network.”

While Syverson indicated that some of the security issues identified by this research have been addressed in recent Tor versions, the findings only added to a growing list of other research and anecdotal evidence showing Tor’s not as safe as its boosters want you to think — especially when pitted against determined intelligence agencies.

Case-in-point: In December 2013, a 20-year-old Harvard panicked overachiever named Edlo Kim learned just how little protection Tor offered for would be terrorists.

To avoid taking a final exam he wasn’t prepared for, Kim hit up on the idea of sending in a fake bomb threat. То cover his tracks, he used Tor, supposedly the best anonymity service the web had to offer. But it did little mask his identity from a determined Uncle Sam. A joint investigation, which involved the FBI, the Secret Service and local police, was able to track the fake bomb threat right back to Kim — in less than 24 hours.

As the FBI complaint explained, “Harvard University was able to determine that, in the several hours leading up to the receipt of the e-mail messages described above, ELDO KIM accessed TOR using Harvard’s wireless network.” All that Tor did was make the cops jump a few extra steps. But it wasn’t hard, nothing that a bit of manpower with full legal authority to access network records couldn’t solve. It helped that Harvard’s network logging all metadata access on the network — sorta like the NSA.

Over the past few years, U.S. law enforcement has taken control and shutdown a series of illegal child porn and drug marketplaces operating on what should have been untraceable, hyper-anonymous servers running in the Tor cloud.

In 2013, they took down Freedom Hosting, which was accused of being a massive child porn hosting operation — but not before taking control of its servers and intercepting all of its communication with customers. The FBI did the same thing that same year with the online drug superstore Silkroad, which also ran its services in the Tor cloud. Although, rookie mistakes helped FBI unmask the identity of Dred Pirate Roberts, it is still a mystery how they were able to totally take over and control, and even copy, a server run in the Tor cloud — something that is supposed to be impossible.

Back in 2007, a Swedish hacker/researcher named Dan Egerstad showed that just by running a Tor node, he could siphon and read all the unencrypted traffic that went through his chunk of the Tor network. He was able to access logins and passwords to accounts of NGOs, companies, and the embassies of India and Iran. Egerstad thought at first that embassy staff were just being careless with their info, but quickly realized that he had actually stumbled on a hack/surveillance operation in which Tor was being used to covertly access these accounts.

Although Egerstad was a big fan of Tor and still believes that Tor can provide anonymity if used correctly, the experience made him highly suspicious.

He told Sydney Morning Herald that he thinks many of the major Tor nodes are being run by intelligence agencies or other parties interested in listening in on Tor communication.

“I don’t like speculating about it, but I’m telling people that it is possible. And if you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they’re using lots of bandwidth, they’re heavy-duty servers and so on. Who would pay for this and be anonymous? For example, five of six of them are in Washington D.C.…”

Tor stinks?

Tor supporters point to a cache of NSA documents leaked by Snowden to prove that the agency fears and hates Tor. A 2013 Guardian story based on these docs — written by James Ball, Bruce Schneier and Glenn Greenwald — argues that agency is all but powerless against the anonymity tool.

…the documents suggest that the fundamental security of the Torservice remains intact. One top-secret presentation, titled ‘Tor Stinks’, states: “We will never be able to de-anonymize all Tor users all the time.” It continues: “With manual analysis we can de-anonymize a very small fraction of Tor users,” and says the agency has had “no success de-anonymizing a user in response” to a specific request.

Another top-secret presentation calls Tor “the king of high-secure, low-latency internet anonymity”.

But the NSA docs are far from conclusive and offer conflicting bits of evidence, allowing for multiple interpretations. But the fact is that the NSA and GCHQ clearly have the capability to compromise Tor, but it might take a bit of targeted effort.

One thing is clear: the NSA most certainly does not hate or fear Tor. And some aspects about Tor are definitely welcomed by the NSA, in part because it helps concentrate potential “targets” in one convenient location.

Tor Stinks… But it Could be Worse

• Critical mass of targets use Tor. Scaring them away might be counterproductive.

• We can increase our success rate and provide more client IPs for individual Tor users.

• We will never get 100% but we don’t need to provide true IPs for every target every time they use Tor.

Tor network is not as difficult to capture as it may seem…

In 2012, Tor co-founder Roger Dingledine revealed that the Tor Network is configured to prioritize speed and route traffic through through the fastest servers/nodes available. As a result, the vast bulk of Tor traffic runs through several dozen of the fastest and most dependable servers: “on today’s network, clients choose one of the fastest 5 exit relays around 25-30% of the time, and 80% of their choices come from a pool of 40-50 relays.”

Dingledine was criticized by Tor community for the obvious reason that funneling traffic through a handful of fast nodes made surveilling and subverting Tor much easier. Anyone can run a Tor node — a research student in Germany, a guy with FIOS connection in Victorville (which is what I did for a few months), an NSA front out of Hawaii or a guy working for China’s Internet Police.

There’s no way of knowing if the people running the fastest most stable nodes are doing it out of goodwill or because it’s the best way to listen in and subvert the Tor network. Particularly troubling was that Snowden’s leaks clearly showed the NSA and GCHQ run Tor nodes, and are interested in running more.

And running 50 Tor nodes doesn’t seem like it would be too difficult for any of the world’s intelligence agencies — whether American, German, British, Russian, Chinese or Iranian. Hell, if you’re an intelligence agency, there’s no reason not to run a Tor node.

Back in 2005, Dingledine admitted to Wired that this was a “tricky design question” but couldn’t provide a good answer to how they’d handle it. In 2012, he dismissed his critics altogether, explaining that he was perfectly willing to sacrifice security for speed — whatever it took to take get more people to use Tor:

This choice goes back to the original discussion that Mike Perry and I were wrestling with a few years ago… if we want to end up with a fast safe network, do we get there by having a slow safe network and hoping it’ll get faster, or by having a fast less-safe network and hoping it’ll get safer? We opted for the “if we don’t stay relevant to the world, Tor will never grow enough” route.

Speaking of spooks running Tor nodes…

If you thought the Tor story couldn’t get any weirder, it can and does. Probably the strangest part of this whole saga is the fact that Edward Snowden ran multiple high-bandwidth Tor nodes while working as an NSA contractor in Hawaii.

This only became publicly known last May, when Tor developer Runa Sandvik (who also drew her salary from Pentagon/State Department sources at Tor) told Wired’s Kevin Poulsen that just two weeks before he would try to get in touch with Glenn Greenwald, Snowden emailed her, explaining that he ran a major Tor node and wanted to get some Tor stickers.

Stickers? Yes, stickers.

Here’s Wired:

In his e-mail, Snowden wrote that he personally ran one of the “major tor exits”–a 2 gbps server named “TheSignal”–and was trying to persuade some unnamed coworkers at his office to set up additional servers. He didn’t say where he worked. But he wanted to know if Sandvik could send him a stack of official Tor stickers. (In some post-leak photos of Snowden you can see the Tor sticker on the back of his laptop, next to the EFF sticker).

Snowden’s request for Tor stickers turned into something a bit more intimate. Turned out that Sandvik was already planning to go to Hawaii for vacation, so she suggested they meet up to talk about communication security and encryption.

She wrote Snowden back and offered to give a presentation about Tor to a local audience. Snowden was enthusiastic and offered to set up a crypto party for the occasion.

So the two of them threw a “crypto party” at a local coffee shop in Honolulu, teaching twenty or so locals how to use Tor and encrypt their hard drives. “He introduced himself as Ed. We talked for a bit before everything started. And I remember asking where he worked or what he did, and he didn’t really want to tell,” Sandvik told Wired.

But she did learn that Snowden was running more than one Tor exit node, and that he was trying to get some of his buddies at “work”to set up additional Tor nodes…

H’mmm….So Snowden running powerful Tor nodes and trying to get his NSA colleagues to run them, too?

I reached out to Sandvik for comment. She didn’t reply. But Wired’s Poulsen suggested that running Tor nodes and throwing a crypto party was a pet privacy project for Snowden. “Even as he was thinking globally, he was acting locally.”

But it’s hard to imagine a guy with top secret security clearance in the midst of planning to steal a huge cache of secrets would risk running a Tor node to help out the privacy cause. But then, who hell knows what any of this means.

I guess it’s fitting that Tor’s logo is an onion — because the more layers you peel and the deeper you get, the less things make sense and the more you realize that there is no end or bottom to it. It’s hard to get any straight answers — or even know what questions you should be asking.

In that way, the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.

First Syrian Rebels Armed And Trained By The CIA ‘on way to battlefield’ , Obama Says

In Uncategorized on September 3, 2013 at 5:35 pm

Free Syrian Army fighters shout “Allahu Akbar” near Deraa in this still image taken from a video obtained by Reuters May 17, 2012

Oldspeak: “And so it begins, as was the case ahead of the U.S. military strike to achieve regime change Libya, U.S. trained mercenaries are on the move, no doubt to secure key infrastructure and oil assets. Keep in mind, this is not the first U.S. miltary-intelligence complex offensive in Syria.  It’s the latest in a long line actions, most covert, against Syria.  The U.S. and U.K. have been training anti-government forces in Syria for some time now with the aim of eliciting “collapse” of Assad’s regime “from within.”  Ignore the kabuki theater of congressional hearings and votes, this war is a go. There are 5  missile destroyers, a nuclear powered aircraft carrier, and multiple marine amphibious assault ships off the coast of Syria right now. A majority of the American people do not support this attack. Yet politicians are charging ahead. Just as in Libya, this war is not about “protecting innocents” or “detering chemical weapons” use. This attack has been, as in Libya, planned years in advance. There is as of today, no concrete, publicly verifiable evidence that Assad authorized the use of chemical weapons. Yet U.S. Government officials, assert their certainty “beyond a reasonable doubt” that evidence exists. Never mind that they’ve tried to derail the investigations of U.N. inspectors. Senators casually discuss the prospect of regime change. This war is about securing mideast oil and pipeline routes for global energy and banking corporations.” -OSJ

By Raf Sanchez @ The U.K. Telegraph:

During a meeting at the White House, the president assured Senator John McCain that after months of delay the US was meeting its commitment to back moderate elements of the opposition.

Mr Obama said that a 50-man cell, believed to have been trained by US special forces in Jordan, was making its way across the border into Syria, according to the New York Times.

The deployment of the rebel unit seems to be the first tangible measure of support since Mr Obama announced in June that the US would begin providing the opposition with small arms.

Congressional opposition delayed the plan for several weeks and rebel commanders publicly complained the US was still doing nothing to match the Russian-made firepower of the Assad regime.

Mr McCain has been a chief critic of the White House’s reluctance to become involved in Syria and has long demanded that Mr Obama provide the rebels with arms needed to overthrow the regime.

He and Senator Lindsey Graham, a fellow Republican foreign policy hawk, emerged from the Oval Office meeting on Monday cautiously optimistic that Mr Obama would step up support for the rebels.

“There seems to be emerging from this administration a pretty solid plan to upgrade the opposition,” Mr Graham said.

He added that he hoped the opposition would be given “a chance to speak directly to the American people” to counter US fears that they were dominated by al-Qaeda sympathisers.

“They’re not trying to replace one dictator, Assad, who has been brutal… to only have al-Qaeda run Syria,” Mr Graham said.

The US announced in June, following the first allegations the Assad regime had used chemical weapons, that it would send light arms to the rebels but refused to provide anti-aircraft missiles and other heavy weapons.

American concerns were born partly out of the experience of Afghanistan in the 1980s, when CIA weapons given to the anti-Russian mujahideen were later used by the Taliban.

The United States’ Secret Armies Fighting Perpetual War Plunge Us Deeper Into Violence

In Uncategorized on August 24, 2012 at 2:17 pm

Shadow figureOldspeak: “While corporocratic media focuses the U.S. peoples  attention on Willard Romney’s  Birther Joke,  a “Legitmate Rape” scandal and the latest  mass shooting, Obama’s Secret wars are making matters worse for the U.S.  Combined with his remote controlled drone bombing campaigns, they are literally manufacturing ‘terrorists’ and violence.   (This is essential to prosecuting perpetual war.)  Is there any wonder why the terrorism U.S. visits on the world is coming home? Literally manifesting in its citizens, lashing out in violence born of  the effects of corporate consolidation,  job destruction, austerity measures and the hollowing out of  the American economy? “The multitudes of crimes these killers, torturers, kidnappers, propagandists, special operations units and spies have carried out in our name are well known to those outside our gates. There are hundreds of millions of people who have a tragic intimacy with the twisted and brutal soul of American imperialism. Okinawans. Guatemalans. Cubans. Congolese. Brazilians. Argentines. Indonesians. Iranians. Palestinians. Panamanians. Vietnamese. Cambodians. Filipinos. South Koreans. Taiwanese. Nicaraguans. Salvadorans. Afghans. Iraqis. Yemenis. Somalis. They can all tell us who we are, if we can listen. But we do not. We are as ignorant, gullible and naive as children. We celebrate fictitious red-white-and-blue virtues while our clandestine armies, which at times achieve short-term objectives but always finally plunge us deeper into violence, have steadily weakened and discredited the nation as well as the purported values for which it stands.” -Chris HedgesAs the nation grows weaker, so does its ability to resist tyranny. As the nation is directed to focus on an ever-expanding universe of things that don’t really matter, the corporatocracy grows stronger. Further consolidating control over and monitoring more and more aspects of citizens lives. Stripping away ever more rights, protections, avenues of dissent, transparency, accountability, oversight, citizen participation.   The militarization & violence saturation of societies and cultures worldwide continue unabated.  Perpetual secret war is marketed to the people like a reality show as in “Stars Earn Stripes“. While our actual secret wars, supplied its death-dealing machines by the same entities that, bring us this sort of  entertainment (The American TV network NBC and all it’s related outlets are wholly owned subsidiaries of multinational weapons manufacturer General Electric. )When will the people say “ENOUGH”! !When will we reject the violence that consumes the world, get off the Violence-Go-Round, and embrace healing, collaboration, love and peace? It’s the only sure way to change the fate of our planet.  “War Is Peace”. “Ignorance Is Strength”. “Freedom Is Slavery“. Profit Is Paramount.

By Chris Hedges @ Truthout:

A Swedish documentary filmmaker released a film last year called “Last Chapter-Goodbye Nicaragua.”In it he admitted that he unknowingly facilitated a bombing, almost certainly orchestrated by the Sandinista government of Nicaragua, which took the lives of three reporters I worked with in Central America. One of them, Linda Frazier, was the mother of a 10-year-old son. Her legs were torn apart by the blast, at La Penca, Nicaragua, along the border with Costa Rica, in May of 1984. She bled to death as she was being taken to the nearest hospital, in Ciudad Quesada, Costa Rica.

The admission by Peter Torbiornsson that he unwittingly took the bomber with him to the press conference was a window into the sordid world of espionage, terrorism and assassination that was an intimate part of every conflict I covered. It exposed the cynicism of undercover operatives on all sides, men and women who lie and deceive for a living, who betray relationships, including between each other, who steal and who carry out murder. One knows them immediately. Their ideological allegiances do not matter. They have the faraway eyes of the disconnected, along with nebulous histories and suspicious and vague associations. They tell incongruous personal stories and practice small deceits that are part of a pathological inability to tell the truth. They can be personable, even charming, but they are also invariably vain, dishonest and sinister. They cannot be trusted. It does not matter what side they are on. They were all the same. Gangsters.

All states and armed groups recruit and use members of this underclass. These personalities gravitate to intelligence agencies, terrorist cells, homeland security, police departments, the special forces and revolutionary groups where they can live a life freed from moral and legal constraints. Right and wrong are banished from their vocabulary. They disdain the constraints of democracy. They live in this nebulous underworld to satisfy their lusts for power and violence. They have no interest in diplomacy and less in peace. Peace would put them out of business; for them it is simply the temporary absence of war, which they are sure is inevitable. Their job is to use violence to purge the world of evil. And in the United States they have taken as hostages our diplomatic service and our foreign policy establishment. The CIA has become a huge private army, as Chalmers Johnson pointed out in his book “Nemesis: The Last Days of the American Republic,” that is “unaccountable to the Congress, the press or the public because everything it does is secret.” C. Wright Mills called the condition “military metaphysics”-“the cast of mind that defines international reality as basically military.”

Since the attacks of 9/11 the U.S. Special Operations Command (USSOCOM)-which includes the Green Berets, the Army Rangers and the Navy SEALs-has seen its budget quadrupled. There are now some 60,000 USSOCOM operatives, whom the president can dispatch to kill without seeking congressional approval or informing the public. Add to this the growth of intelligence operatives. As Dana Priest and William M. Arkin reported in The Washington Post, “Twenty-four [new intelligence] organizations were created by the end of 2001, including the Office of Homeland Security and the Foreign Terrorist Asset Tracking Task Force. In 2002, 37 more were created to track weapons of mass destruction, collect threat tips, and coordinate the new focus on counterterrorism. That was followed the next year by 36 new organizations; and 26 after that; and 31 more; and 32 more; and 20 or more each in 2007, 2008, and 2009. In all, at least 263 organizations have been created or reorganized as a response to 9/11.”

There are now many thousands of clandestine operatives, nearly all of them armed and equipped with a license to kidnap, torture and kill, working overseas or domestically with little or no oversight and virtually no transparency. We have created a state within a state. A staggering 40 percent of the defense budget is secret, as is the budget of every intelligence agency. I tasted enough of this subterranean world to fear it. When you empower these kinds of people you snuff out the rule of law. You empower criminals and assassins. One of these old CIA operatives, Felix Rodríguez, was in El Salvador when I was there during the war in the early 1980s. He wore Che Guevara’s Rolex watch. He had removed it from Guevara’s body after ordering Guevara to be executed in the Bolivian jungle. I would later run into clandestine operatives in the Middle East, Africa or Yugoslavia I knew from the wars in Central America. We would invariably chat briefly in Spanish. It was a strange fraternity, even if I was the outsider. The Great Game.

These black forces have created as much havoc, or blowback, in the Middle East as they did in Latin America. And by the time they are done there will be so many jihadists willing to blow themselves up to vanquish America, the Islamic radicals will be running out of explosives. These clandestine operatives peddle a self-fulfilling prophecy. They foment the very instability that allows them to continue to proliferate like cockroaches. The dozens of CIA kidnappings-“extraordinary renditions”-of radical Islamists in the late 1990s, especially from the Balkans, many shipped to countries such as Egypt where they were tortured and murdered by our allies, was the fuse that lit the al-Qaida bombings of the U.S. embassies in Kenya and Tanzania in 1998 and the attacks on the Navy destroyer Cole in the Yemeni port of Aden on Oct. 12, 2000. Militant Islamists had publicly vowed reprisals for these renditions.

“Let me tell you about these intelligence guys,” President Lyndon Johnson is quoted as saying in Robert M. Gates book “From the Shadows.” “When I was growing up in Texas, we had a cow named Bessie. I’d get her in the stanchion, seat myself, and squeeze out a bail of fresh milk. One day, I’d worked hard and gotten a full pail of milk, but I wasn’t paying attention and old Bessie swung her shit-smeared tail through that bucket of milk. Now, you know, that’s what these intelligence guys do. You work hard and get a good program or policy going, and they swing a shit-smeared tail through it.”

These operatives invariably prey on the useful idiots, those naive idealists who bind themselves to a cause and are oblivious to the evil they serve, or to those simply greedy for money and a little power. Joseph Conrad got it right in “The Secret Agent,” his novel about anarchist revolutionaries who recruit the mentally disabled Stevie to place a bomb at the Royal Observatory at Greenwich. Al-Qaida repeated this scenario when it convinced Richard Reid, a petty criminal who was challenged mentally, to get on an airplane with a shoe bomb. The CIA is no different. When the CIA could not induce the Chilean army commander, General René Schneider, to overthrow the elected government of Salvador Allende, it recruited Chilean soldiers to assassinate him. The CIA provided submachine guns, ammunition and $50,000 to the group. It shipped the money and weapons from Washington to Santiago in the regular diplomatic pouch and then hand-delivered the cash and guns to the hit men. On the afternoon of Oct. 22, 1970, the killers surrounded Schneider’s car and shot him. He died three days later. Allende was overthrown in a U.S.-orchestrated coup on Sept. 11, 1973. And this is, basically, what happened in the La Penca bombing in Nicaragua in 1984. Torbiornsson, one of those dimwitted “internationalists” who showed up in Managua under the guise of journalism or solidarity, allowed himself to be used by the Sandinista intelligence service. The target of the bombing was the mercurial rebel leader Eden Pastora, once a commander with the Sandinistas who had defected to fight for the U.S.-backed Contras (the CIA found him as unmanageable as the Sandinistas had) before returning to become part of the Sandinista government in Managua. Pastora was wounded in the blast.

I was in El Salvador in May 1984 when Pastora offered to hold a meeting with journalists in La Penca. It was a long way to travel for one story. I decided in the end not to make the trip with my colleagues. It was a decision that may have saved my life.

What none of us knew until Torbiornsson’s admission is that he had been approached by Sandinista intelligence officials and asked to take along a Sandinista spy whose name was supposedly Per Anker Hansen. When the bombing was first investigated, Torbiornsson lied. He told investigators that he had met Hansen, who passed himself off as a Danish photographer, six weeks before the bombing, when they stayed in the same hotel in Costa Rica. Now Torbiornsson concedes he was introduced to Hansen in Managua. He said that though he knew Hansen was a spy he had no inkling he was an assassin.

“It took me a long time to understand that it was my friends who put the bomb,” Torbiornsson told the BBC in speaking of the Sandinistas. “It has been like a wound in my soul. … I cannot emphasize how sorry I am.”

Hansen was, according to an investigation carried out by reporters Juan Tamayo and Doug Vaughn at The Miami Herald, in fact named Vital Roberto Gaguine. He worked clandestinely with the Sandinistas in the 1980s and was a member of the Argentine People’s Revolutionary Army (ERP). He brought and ignited the bomb. He reportedly died in 1989 while carrying out an armed assault with 18 others on army barracks outside Buenos Aires. Enrique Haraldo Gorrioran, who was the commander of the ERP cell in Managua and who ordered the barracks attack, but who did not take part, is reputed to have been a double agent, sending Gaguine and his companions to assured slaughter. He is reportedly living in Brazil from the earnings the revolutionary group made from kidnappings and bank robberies. Trust is exiled in this world. Those who willingly sacrifice others are often themselves sacrificed.

The Newsweek correspondent Susan Morgan, standing in the front, shielded Torbiornsson from the full force of the blast. Morgan suffered serious injuries in one arm, her legs and face. The BBC recently ran a video clip of Morgan confronting the hapless Torbiornsson, who seems still unable to fully understand his culpability.

The killers and the paymasters, the spies and gangsters, the terrorists and jihadists, on all sides of the divide, have grown in numbers to carry out a vast war in the shadows. They are determined to perpetuate the senseless violence and mayhem that are the currency of their profession. And they make peace and diplomacy impossible. That is their goal. Sen. Frank Church in 1975, after chairing a Senate committee investigation into U.S. intelligence activities, defined “covert action” as a “semantic disguise for murder, coercion, blackmail, bribery, the spreading of lies, and consorting with known torturers and international terrorists.”

The multitudes of crimes these killers, torturers, kidnappers, propagandists, special operations units and spies have carried out in our name are well known to those outside our gates. There are hundreds of millions of people who have a tragic intimacy with the twisted and brutal soul of American imperialism. Okinawans. Guatemalans. Cubans. Congolese. Brazilians. Argentines. Indonesians. Iranians. Palestinians. Panamanians. Vietnamese. Cambodians. Filipinos. South Koreans. Taiwanese. Nicaraguans. Salvadorans. Afghans. Iraqis. Yemenis. Somalis. They can all tell us who we are, if we can listen. But we do not. We are as ignorant, gullible and naive as children. We celebrate fictitious red-white-and-blue virtues while our clandestine armies, which at times achieve short-term objectives but always finally plunge us deeper into violence, have steadily weakened and discredited the nation as well as the purported values for which it stands. These clandestine armies travel the globe, awash in hundreds of millions of taxpayer dollars, sowing dragon’s teeth that rise up later, like the warriors in the myth of the Golden Fleece, to become mirror images of our own monstrosities.

Assassin-In-Chief: Secret “Kill List”, Drone Strikes & Covert Wars Significantly Expanded Under Obama

In Uncategorized on June 5, 2012 at 7:13 pm

Oldspeak:”Assassination has been thoroughly institutionalized, normalized, and bureaucratized around the figure of the President. Without the help of or any oversight from the American people or their elected representatives, The president alone is now responsible for regular killings thousands of miles away, including those of civilians and even children.  He is, in other words, if not a king, at least the king of American assassinations.  On that score, his power is total and completely unchecked.  He can prescribe death for anyone “nominated,” choosing any of the “baseball cards” (PowerPoint bios) on that kill list and then order the drones to take them (or others in the neighborhood) out. can stop any attack, any killing, but there is no one, nor any mechanism that can stop him.  An American global killing machine (quite literally so, given that growing force of drones) is now at the beck and call of a single, unaccountable individual.  This is the nightmare the founding fathers tried to protect us from.” -Tom Engelhardt. More failed, murderous and counterproductive atrocity worthy Bush-era terrorism policy expanded, unfettered and completely unaccountable to anyone but Barack Obama. While corporate sponsored sheeple ring their hands over psuedo-divisive and sensationalized “issues” like gay marriage, Our president has done away with 5th amendment right not to “be deprived of life, liberty, or property, without due process of law.” Everyone in a “strike zone” is civilian or not, designated as a “combatant” or “militant” and is thus subject to summary execution at the whim of the President. The U.S.homeland has been designated as a “battleground”, and the military is allowed to operated here. Unmanned drones are watching us from U.S. skies right now. Protestors are classified as “low-level terrorists”. What happens when the “terrorist threat” from within becomes greater than that from without? As we’ve seen from the brutality of responses to Occupy Wall Street Protests nation-wide by hyper-militarized and aggressively trained police forces, whatever happens ain’t pretty. Protestors homes have been raided, and they’ve been arrested, detained, and charged with terrorism BEFORE THEY EVEN ACTUALLY PROTEST. Pre-crime is now prosecutable.All the elements are in place to facilitate a rapid transition to a fully formed totalitarian state. I highly recommend you read the NY Times propaganda piece before you read the articles below. “War Is Peace”, “Freedom Is Slavery”

Related Stories:

Hope Burning

Obama Expands Secret Wars Across The Globe

By Tom Engelhardt @ TomDispatch.com:

Be assured of one thing: whichever candidate you choose at the polls in November, you aren’t just electing a president of the United States; you are also electing an assassin-in-chief.  The last two presidents may not have been emperors or kings, but they — and the vast national-security structure that continues to be built-up and institutionalized around the presidential self — are certainly one of the nightmares the founding fathers of this country warned us against.  They are one of the reasons those founders put significant war powers in the hands of Congress, which they knew would be a slow, recalcitrant, deliberative body.

Thanks to a long New York Times piece by Jo Becker and Scott Shane, “Secret ‘Kill List’ Proves a Test of Obama’s Principles and Will,” we now know that the president has spent startling amounts of time overseeing the “nomination” of terrorist suspects for assassination via the remotely piloted drone program he inherited from President George W. Bush and which he has expanded exponentially.  Moreover, that article was based largely on interviews with “three dozen of his current and former advisers.”  In other words, it was essentially an administration-inspired piece — columnist Robert Scheer calls it “planted” — on a “secret” program the president and those closest to him are quite proud of and want to brag about in an election year.

The language of the piece about our warrior president was generally sympathetic, even in places soaring.  It focused on the moral dilemmas of a man who — we now know — has personally approved and overseen the growth of a remarkably robust assassination program in Yemen, Somalia, and Pakistan based on a “kill list.” Moreover, he’s regularly done so target by target, name by name.  (The Times did not mention a recent U.S. drone strike in the Philippines that killed 15.)  According to Becker and Shane, President Obama has also been involved in the use of a fraudulent method of counting drone kills, one that unrealistically deemphasizes civilian deaths.

Historically speaking, this is all passing strange.  The Times calls Obama’s role in the drone killing machine “without precedent in presidential history.”  And that’s accurate.

It’s not, however, that American presidents have never had anything to do with or been in any way involved in assassination programs.  The state as assassin is hardly unknown in our history.  How could President John F. Kennedy, for example, not know about CIA-inspired or -backed assassination plots against Cuba’s Fidel Castro, the Congo’s Patrice Lumumba, and South Vietnamese autocrat (and ostensible ally) Ngo Dinh Diem? (Lumumba and Diem were successfully murdered.)  Similarly, during Lyndon Johnson’s presidency, the CIA carried out a massive assassination campaign in Vietnam, Operation Phoenix.  It proved to be a staggeringly profligate program for killing tens of thousands of Vietnamese, both actual enemies and those simply swept up in the process.

In previous eras, however, presidents either stayed above the assassination fray or practiced a kind of plausible deniability about the acts.  We are surely at a new stage in the history of the imperial presidency when a president (or his election team) assembles his aides, advisors, and associates to foster a story that’s meant to broadcast the group’s collective pride in the new position of assassin-in-chief.

Religious Cult or Mafia Hit Squad?

Here’s a believe-it-or-not footnote to our American age.  Who now remembers that, in the early years of his presidency, George W. Bush kept what the Washington Post’s Bob Woodward called “his own personal scorecard for the war” on terror?  It took the form of photographs with brief biographies and personality sketches of those judged to be the world’s most dangerous terrorists, each ready to be crossed out by Bush once captured or killed. That scorecard was, Woodward added, always available in a desk drawer in the Oval Office.

Such private presidential recordkeeping now seems penny-ante indeed.  The distance we’ve traveled in a decade can be measured by the Times’ description of the equivalent of that “personal scorecard” today (and no desk drawer could hold it):

“It is the strangest of bureaucratic rituals: Every week or so, more than 100 members of the government’s sprawling national security apparatus gather, by secure video teleconference, to pore over terrorist suspects’ biographies and recommend to the president who should be the next to die. This secret ‘nominations’ process is an invention of the Obama administration, a grim debating society that vets the PowerPoint slides bearing the names, aliases, and life stories of suspected members of Al Qaeda’s branch in Yemen or its allies in Somalia’s Shabab militia. The nominations go to the White House, where by his own insistence and guided by [counterterrorism ‘tsar’ John O.] Brennan, Mr. Obama must approve any name.”

In other words, thanks to such meetings — on what insiders have labeled “terror Tuesday” — assassination has been thoroughly institutionalized, normalized, and bureaucratized around the figure of the president.  Without the help of or any oversight from the American people or their elected representatives, he alone is now responsible for regular killings thousands of miles away, including those of civilians and even children.  He is, in other words, if not a king, at least the king of American assassinations.  On that score, his power is total and completely unchecked.  He can prescribe death for anyone “nominated,” choosing any of the “baseball cards” (PowerPoint bios) on that kill list and then order the drones to take them (or others in the neighborhood) out.

He and he alone can decide that assassinating known individuals isn’t enough and that the CIA’s drones can instead strike at suspicious “patterns of behavior” on the ground in Yemen or Pakistan. He can stop any attack, any killing, but there is no one, nor any mechanism that can stop him.  An American global killing machine (quite literally so, given that growing force of drones) is now at the beck and call of a single, unaccountable individual.  This is the nightmare the founding fathers tried to protect us from.

In the process, as Salon’s Glenn Greenwald has pointed out, the president has shredded the Fifth Amendment, guaranteeing Americans that they will not “be deprived of life, liberty, or property, without due process of law.”  The Justice Department’s Office of Legal Counsel produced a secret memo claiming that, while the Fifth Amendment’s due process guarantee does apply to the drone assassination of an American citizen in a land with which we are not at war, “it could be satisfied by internal deliberations in the executive branch.”  (That, writes Greenwald, is “the most extremist government interpretation of the Bill of Rights I’ve heard in my lifetime.”)  In other words, the former Constitutional law professor has been freed from the law of the land in cases in which he “nominates,” as he has, U.S. citizens for robotic death.

There is, however, another aspect to the institutionalizing of those “kill lists” and assassination as presidential prerogatives that has gone unmentioned.  If the Times article — which largely reflects how the Obama administration cares to see itself and its actions — is to be believed, the drone program is also in the process of being sanctified and sacralized.

You get a sense of this from the language of the piece itself.  (“A parallel, more cloistered selection process at the C.I.A. focuses largely on Pakistan…”)  The president is presented as a particularly moral man, who devotes himself to the “just war” writings of religious figures like Thomas Aquinas and St. Augustine, and takes every death as his own moral burden.  His leading counterterrorism advisor Brennan, a man who, while still in the CIA, was knee-deep in torture controversy, is presented, quite literally, as a priest of death, not once but twice in the piece.  He is described by the Times reporters as “a priest whose blessing has become indispensable to Mr. Obama.”  They then quote the State Department’s top lawyer, Harold H. Koh, saying, “It’s as though you had a priest with extremely strong moral values who was suddenly charged with leading a war.”

In the Times telling, the organization of robotic killing had become the administration’s idée fixe, a kind of cult of death within the Oval Office, with those involved in it being so many religious devotees.  We may be, that is, at the edge of a new state-directed, national-security-based religion of killing grounded in the fact that we are in a “dangerous” world and the “safety” of Americans is our preeminent value.  In other words, the president, his apostles, and his campaign acolytes are all, it seems, praying at the Church of St. Drone.

Of course, thought about another way, that “terror Tuesday” scene might not be from a monastery or a church synod, but from a Mafia council directly out of a Mario Puzo novel, with the president as the Godfather, designating “hits” in a rough-and-tumble world.

How far we’ve come in just two presidencies!  Assassination as a way of life has been institutionalized in the Oval Office, thoroughly normalized, and is now being offered to the rest of us as a reasonable solution to American global problems and an issue on which to run a presidential campaign.

Downhill All the Way on Blowback Planet

After 5,719 inside-the-Beltway (largely inside-the-Oval-Office) words, the Times piece finally gets to this single outside-the-Beltway sentence: “Both Pakistan and Yemen are arguably less stable and more hostile to the United States than when Mr. Obama became president.”

Arguably, indeed!  For the few who made it that far, it was a brief reminder of just how narrow, how confining the experience of worshiping at St. Drone actually is.  All those endless meetings, all those presidential hours that might otherwise have been spent raising yet more money for campaign 2012, and the two countries that have taken the brunt of the drone raids are more hostile, more dangerous, and in worse shape than in 2009.  (And one of them, keep in mind, is a nuclear power.)  News articles since have only emphasized how powerfully those drones have radicalized local populations — however many “bad guys” (and children) they may also have wiped off the face of the Earth.

And though the Times doesn’t mention this, it’s not just bad news for Yemen or Pakistan.  American democracy, already on the ropes, is worse off, too.

What should astound Americans — but seldom seems to be noticed — is just how into the shadows, how thoroughly military-centric, and how unproductive has become Washington’s thinking at the altar of St. Drone and its equivalents (including special operations forces, increasingly the president’s secret military within the military). Yes, the world is always a dangerous place, even if far less so now than when, in the Cold War era, two superpowers were a heartbeat away from nuclear war.  But — though it’s increasingly heretical to say this — the perils facing Americans, including relatively modest dangers from terrorism, aren’t the worst things on our planet.

Electing an assassin-in-chief, no matter who you vote for, is worse.  Pretending that the Church of St. Drone offers any kind of reasonable or even practical solutions on this planet of ours, is worse yet.  And even worse, once such a process begins, it’s bound to be downhill all the way.  As we learned last week, again in the Times, we not only have an assassin-in-chief in the Oval Office, but a cyberwarrior, perfectly willing to release a new form of weaponry, the most sophisticated computer “worm” ever developed, against another country with which we are not at war.

This represents a breathtaking kind of rashness, especially from the leader of a country that, perhaps more than any other, is dependent on computer systems, opening the U.S. to potentially debilitating kinds of future blowback.  Once again, as with drones, the White House is setting the global rules of the road for every country (and group) able to get its hands on such weaponry and it’s hit the highway at 140 miles per hour without a cop in sight.

James Madison, Thomas Jefferson, George Washington, and the rest of them knew war, and yet were not acolytes of the eighteenth century equivalents of St. Drone, nor of presidents who might be left free to choose to turn the world into a killing zone.  They knew at least as well as anyone in our national security state today that the world is always a dangerous place — and that that’s no excuse for investing war powers in a single individual.  They didn’t think that a state of permanent war, a state of permanent killing, or a president free to plunge Americans into such states was a reasonable way for their new republic to go.  To them, it was by far the more dangerous way to exist in our world.

The founding fathers would surely have chosen republican democracy over safety.  They would never have believed that a man surrounded by advisors and lawyers, left to his own devices, could protect them from what truly mattered.  They tried to guard against it.  Now, we have a government and a presidency dedicated to it, no matter who is elected in November.

Tom Engelhardt, co-founder of the American Empire Project and author of The United States of Fear as well as The End of Victory Culture, runs the Nation Institute’s TomDispatch.com. His latest book, co-authored with Nick Turse, is Terminator Planet: The First History of Drone Warfare, 2001-2050. To listen to Timothy MacBain’s latest Tomcast audio interview in which Engelhardt discusses drone warfare and the Obama administration, click here or download it to your iPod here.

Former Counterterrorism Czar Accuses Tenet, Other CIA Officials Of Cover-Up Of Pre 9/11 Knowledge Of Attack

In Uncategorized on August 11, 2011 at 9:40 pm

Oldspeak:” The CIA was hiding knowledge of 9/11 terrorists in the U.S. prior to 9/11. The holes that have been poked in the “Official Story of 9/11″ have been numerous and largely ignored as crazy people conspiracy theories. But when a ultra-high level 30 years in intelligence official starts poking at it, that’s ALOT harder to ignore. That official Richard Clark has accused ‘former top CIA officials – George Tenet, Cofer Black and Richard Blee of knowingly withholding intelligence from the Bush and Clinton White House, the FBI, Immigration and the State and Defense Departments about two of the 9/11 hijackers who had entered the United States more than a year before the attacks. Moreover, Clarke says the former CIA officials likely engaged in a cover-up by withholding key details about two of the hijackers from the 9/11 Commission.’-Jason Leopold The reason he gave was they were trying to “to protect the agency from scrutiny.” Given the CIAs long and well documented history of  dirty tricks, political assassinations, staged terror attacks, and general institutional malfeasance, it’s a plausible reason.But given CIA/ISI’s intimate links to Bin Laden and the perpetrators of the attack, I tend to believe it’s not the ONLY reason. It’ll be interesting to see what other hole-poking details emerge.”

By Jason Leopold @ Truthout:

With the tenth anniversary of 9/11 just a month away, the intelligence failures leading up to the attacks on the World Trade Center and the Pentagon have started to attract fresh scrutiny from former counterterrorism officials, who have called into question the veracity of the official government narrative that concluded who knew what and when.

Indeed, recently Truthout published an exclusive report based on documents obtained under the Freedom of Information Act and an interview with a former high-ranking counterterrorism official that showed how a little-known military intelligence unit, unbeknownst to the various investigative bodies probing the terrorist attacks, was ordered by senior government officials to stop tracking Osama bin Laden and al-Qaeda’s movements prior to 9/11.

And now, in a stunning new interview set to air on a local PBS affiliate in Colorado tonight, former counterterrorism czar Richard Clarke, for the first time, levels explosive allegations against three former top CIA officials – George Tenet, Cofer Black and Richard Blee – accusing them of knowingly withholding intelligence from the Bush and Clinton White House, the FBI, Immigration and the State and Defense Departments about two of the 9/11 hijackers who had entered the United States more than a year before the attacks. Moreover, Clarke says the former CIA officials likely engaged in a cover-up by withholding key details about two of the hijackers from the 9/11 Commission.

“They’ve been able to get through a joint House investigation committee and get through the 9/11 Commission and this has never come out,” Clarke said about Blee, Tenet and Black. “They got away with it.”

Clarke was the chief counterterrorism adviser for the Clinton and Bush administrations, who famously testified before the 9/11 Commission probing the terrorist attacks that “your government failed you.”

In October 2009, he spoke to documentarians John Duffy and Ray Nowosielski, who have been working on a film about Blee and the secrecy surrounding his role in the intelligence failures leading up to 9/11, which is set to air on the tenth anniversary of the attacks. Duffy and  Nowosielski, whose previous film, “Press For Truth,” followed four 9/11 widows as they lobbied the Bush White House to convene an independent commission to probe the attacks, have also launched a new transparency web site,SecrecyKills.com, set to go live this evening with a campaign aimed at further unmasking Blee.

Clarke did not respond to questions about whether he still stood behind the comments he made about Tenet, Black, Blee nearly two years ago, which he admits he doesn’t have evidence to back up. But Nowosielski told Truthout he spoke to Clarke last week to inform him that Tenet, Black and Blee had issued a joint statement that was highly critical of his charges, and Clarke told  Nowosielski he has not changed his position.

Clarke asserts in the 13-minute interview that Tenet, the former CIA director; Black, who headed the agency’s Counterterrorist Center; and Blee, a top aide to Tenet who led the CIA’s Bin Laden Issues Station, also known as Alec Station, whose true identity was revealed for the first time two years ago, are to blame for the government’s failure to capture Nawaf al-Hazmi and Khalid al-Mihdhar, who hijacked American Airlines Flight 77 with three other terrorists and flew the jetliner directly into the Pentagon killing 189 people.

“George Tenet followed all of the information about al-Qaeda in microscopic detail,” Clarke told Duffy and  Nowosielski. “He read raw intelligence reports before analysts in the counterterrorism center did and he would pick up the phone and call me at 7:30 in the morning and talk about them.”

But Tenet, who was awarded the Medal of Freedom by George W. Bush in 2004, did not share what Clarke says he knew about the al-Hazmi and the al-Mihdhar case.

In early January 2000, CIA analysts were informed by the National Security Agency that al-Hamzi and al-Mihdhar were heading to a meeting of other al-Qaeda associates in Malaysia, their travel arranged by Osama bin Laden’s Yemen operations center. The CIA surveilled the meeting and took photographs of the men. From Malaysia, al-Hazmi, al-Mihdhar and Walid bin Attash, the alleged mastermind behind the USS Cole bombing, traveled to Thailand, which the CIA reported to Alec Station in a cable. Al-Hazmi and al-Mihdhar then boarded a flight bound for Los Angeles, arriving in the city on January 15, 2000. The CIA had claimed, according to the 9/11 Commission report, that they lost track of all three men in Thailand. Despite being aware that the terrorists had already obtained tourist visas, the agency still failed to notify the FBI and State Department for inclusion on the latter’s terrorist watch list. Remarkably, Mihdhar left Southern California for Yemen in June 2000 and, using a new passport, returned to the US undetected on July 4, 2001.

Clarke suggests that if the CIA had shared intelligence about al-Hazmi and al-Mihdhar with him, the FBI, and others, then perhaps the attack on the Pentagon could have been thwarted. As he noted in his book, “Your Government Failed You: Breaking the Cycle of National Security Disasters,” the 9/11 Commission never fleshed out the rationale behind the CIA’s failure to share crucial intelligence information about al-Hazmi and al-Mihdhar with other officials and government agencies.

“As jaded and cynical as I am about government failures, I still find this one mind-boggling and inexplicable,” Clarke wrote. “The 9/11 Commission report does not tell us very much about how or why it happened and their explanations, while they could be correct, strain credulity and leave many questions unanswered.”

“Failure to Communicate”

One of the CIA officials who had been monitoring the Malaysia meeting was a young al-Qaeda analyst named Jennifer Matthews, who had been working with the Bin Laden Issues Station since its inception in 1996. Another analyst, who worked closely with Matthews, was a red-headed woman who, in recent years, has been at the center of a scandal involving the torture and wrongful rendition of at least one detainee. She has since been promoted and continues to work for the CIA on al-Qaeda-related issues. An agency spokesman requested that Truthout not print her name because her identity is classified.

In his recently published book, “Triple Agent,” Washington Post reporter Joby Warrick wrote that former CIA Inspector General John Helgerson probed “CIA missteps that had allowed” al-Hazmi and al-Mihdhar “to enter the United States undetected.”

“Helgerson concluded that the CIA’s Counterterrorism Center had failed to respond to a series of cabled warnings in 2000 about” al-Hazmi and al-Mihdhar “who later became part of the September 11 plot …,” Warrick wrote. “The cables were seen by as many as sixty CIA employees, yet the two operatives’ names were never passed along to the FBI, which might have assigned agents to track them down or shared with the State Department, which could have flagged their named on its watch list. In theory, the arrest of the either man could have led investigators to the other hijackers and the eventual unraveling of the 9/11 plot.

“Helgerson’s report named individual managers who it said bore the greatest responsibility for failing to ensure that vital information was passed to the FBI. The report, never released in full, also recommended that some of the managers be reviewed for possible disciplinary action … Jennifer Matthews was on that list.”

Matthews, who Warrick also says led the agency’s search for the first high-value detainee, Abu Zubaydah, and who was also present at the CIA black site prison in Thailand when Zubaydah was waterboarded after he was captured in March 2002, was among seven CIA officers killed in Khost, Afghanistan, in a December 2009 suicide bombing  at Forward Operating Base Chapman in Afghanistan, which Matthews was chief of.

“A High-Level Decision”

Although Helgerson’s report recommended Matthews be disciplined, Clarke does not believe she or the dozens of other CIA analysts bear the ultimate responsibility for failing to inform the US government for 18 months that al-Hazmi and al-Mihdhar were in the US.

“It’s not as I originally thought, which was that one lonely CIA analyst got this information and didn’t somehow recognize the significance of it,” Clarke said during the interview. “No, fifty, 5-0, CIA personnel knew about this. Among the fifty people in CIA who knew these guys were in the country was the CIA director.”

Still, Clarke said his position as National Coordinator for Security and Information meant he should have received a briefing from CIA about al-Hazmi and al-Mihdhar, explaining “unless somebody intervened to stop the normal automatic distribution I would automatically get it.”

“For me to this day, it is inexplicable why when I had every other detail about everything related to terrorism that the director didn’t tell me, that the director of the counterterrorism center didn’t tell me, that the other 48 people inside CIA that knew about it never mentioned it to me or anyone in my staff in a period of over 12 months … We therefore conclude that there was a high-level decision inside CIA ordering people not to share that information,” Clarke said.

How high level?

“I would think it would have to be made by the director,” Clarke said. “You gotta understand my relationship with [Tenet], we were close friends, he called me several times a day, we shared the most trivial of information with each other, there was not a lack of information sharing, [CIA] told us everything except this.”

So, what happened? Why did the CIA fail to share its intelligence about al-Hazmi and al-Mihdhar with Clarke and other government officials? Clarke believes the CIA may have attempted to “flip” al-Hazmi and al-Mihdhar, but ultimately failed.

That’s an allegation that surfaced in Lawrence Wright’s groundbreaking book, “The Looming Tower: Al-Qaeda and The Road to 9/11.” Wright, who interviewed Clarke for his book, said a team of FBI investigators and federal prosecutors known as Squad I-49 came to believe that the CIA “was shielding Mihdhar and Hazmi because it hoped to recruit them”

“The CIA was desperate for a source inside al-Qaeda; it had completely failed to penetrate the inner circle or even to place a willing partner in the training camps, which were largely open to anyone who showed up,” Wright wrote. “Mihdhar and Hazmi must have seemed like attractive opportunities however, once they entered the United States they were the province of the FBI. The CIA had no legal authority to operate inside the country … It is also possible, as some FBI investigators suspect, the CIA was running a joint venture with Saudi intelligence in order to get around that restriction … These are only theories about the CIA’s failures to communicate vital information to the bureau … Perhaps the agency decided that Saudi intelligence would have a better chance of recruiting these men than the Americans. That would leave no CIA fingerprints on the operation as well.

“This is the view of some very bitter FBI investigators, who wonder why they were never informed of the existence of al-Qaeda operatives inside America. Mihdhar and Hazmi arrived nineteen months before 9/11. The FBI had all the authority it needed to investigate these men and learn what they were up to, but because the CIA had failed to divulge the presence of two active members of al-Qaeda, the hijackers were free to develop their plot until it was too late to stop them.”

“Reckless and Profoundly Wrong”

In response to Clarke’s charges, Tenet, Black and Blee issued a joint statement to Duffy and Nowosielski last week upon learning their interview with Clarke would soon air publicly. The former CIA officials admonished their former colleague, stating his comments were “reckless and profoundly wrong.” Blee’s inclusion in the joint statement marks the first time he has spoken publicly about the events leading up to 9/11.

“Clarke starts with the presumption that important information on the travel of future hijackers to the United States was intentionally withheld from him in early 2000,” the former CIA officials said. “It was not. He wildly speculates that it must have been the CIA Director who could have ordered the information withheld. There was no such order. In fact, the record shows that the Director and other senior CIA officials were unaware of the information until after 9/11.”

“In early 2000, a number of more junior personnel (including FBI agents on detail to CIA) did see travel information on individuals who later became hijackers but the significance of the data was not adequately recognized at the time … Building on his false notion that information was intentionally withheld, Mr. Clarke went on to speculate – which he admits is based on nothing other than his imagination – that the CIA might have been trying to recruit these two future hijackers as agents. This, like much of what Mr. Clarke said in his interview, is utterly without foundation. We testified under oath about what we did, what we knew and what we didn’t know. We stand by that testimony.”

“We Would Have Found Those Assholes”

But Clarke says even as early as July 2001 – two months before the terrorist attacks – when Tenet and Blee called an urgent meeting with President Bush at the White House, they had an opportunity to disclose the fact that al-Hazmi and al-Mihdhar were somewhere in the US, but failed to disclose what they knew.

The CIA waited until late August to inform lower-level FBI agents that al-Hazmi and al-Mihdhar were in the US and were likely planning an attack inside the US. Yet, the CIA continued to conceal the intelligence from senior FBI and Bush administration officials a week prior to the attacks.

Clarke said there’s a “very obvious answer” as to why the CIA continued, as early as September 4, 2001, in a meeting attended by Clarke and other senior Bush administration officials, to withhold intelligence about the two hijackers: to protect the agency from scrutiny.

“I know how all this stuff works I’ve been working it for 30 years,” Clarke said. “You can’t snowball me on this stuff. If they announce on September 4 in the Principals meeting that these guys are in the United States and they told the FBI a few weeks ago I’m going to say ‘wait, time out. How long have you known this? Why haven’t you reported it at the daily threat meetings? Why isn’t it in the daily threat matrix?’ We would have begun an investigation that day into CIA malfeasance and misfeasance that’s why we’re not informed.”

Clarke added that even if the CIA had disclosed what it knew about al-Hazmi and al-Mihdhar as late as September 4, 2001, he believes the FBI could have captured the men and dismantled their plans to attack the Pentagon.

“We would have conducted a massive sweep,” Clarke said. “We would have conducted publicly. We would have found those assholes. There’s no doubt in my mind. Even with only a week left.”

“Operation Fast and Furious”: U.S. Government Openly Admits Arming Mexican Drug Cartels With 30,000 Firearms – But Why?

In Uncategorized on July 9, 2011 at 3:04 pm

Oldspeak:”Iran-Contra Affair: Redux. How bout it. 0_O Your guess is as good as mine. More Change I Can’t Believe In. Makes you wonder who’s really in charge of the U.S. Government.

By Mike Adams @ Natural News:

It is now a widely-reported fact that under the Obama administration, U.S. federal agents actively placed over 30,000 fully-functional weapons into the hands of Mexican drug gangs, then halted all surveillance and tracking activities of where those weapons were going.

This is not a conspiracy theory, nor a piece of fiction. It is now an openly-admitted fact that this was pulled off by the BATFE (Bureau of Alcohol, Tobacco, Firearms and Explosives, more commonly called “ATF”) under orders from Washington. The program was called “Fast and Furious.”

Even Reuters is now covering the news and reporting how members of Congress are outraged to learn that this happened (http://www.reuters.com/article/2011…).

Details are also starting to leak about the cover-up inside ATF, which was led by the U.S. Attorney in Arizona, Dennis Burke, an Obama appointee

(http://dailycaller.com/2011/07/06/i…). The engineering of the illegal gun running went right up the chain of command to the director of the ATF, Kenneth Melson, who is now expected to resign. The real planning of this event went even higher up the chain of command in Washington, possibly all the way to Attorney General Eric Holder (http://dailycaller.com/2011/06/21/i…).

Among the firearms sold to the Mexican drug gangs were AK-47s, thousands of pistols and, remarkably, .50-caliber rifles which are typically used to disable vehicles or carry out sniper-based assassinations at extremely long ranges (up to two miles). The mainstream media is now reporting that these weapons are turning up in violent crimes being committed in Phoenix, Arizona. As an ABC news affiliate reports:

“According to the testimony of three Phoenix ATF agents, including Dodson, hundreds of weapons are now on the streets in the United States and Mexico, possibly in the hands of criminals. Dodson estimated the number could be as many as 1,800 weapons. He estimated agents in the Phoenix field division facilitated the sale of approximately 2,500 weapons to straw purchasers. A few hundred have been recovered.”

How the “Fast and Furious” program put thousands of weapons directly into the hands of Mexican drug gangs

Here’s how “Fast and Furious” worked: Under orders from Washington, ATF agents were specifically told to acquire these weapons using “straw” buyers in the USA, find new buyers in Mexican drug gangs, then sell the weapons and “lose track” of them. Although some agents raised concerns about the insanity, they were overruled by the higher-ups in Washington who wanted to pursue this policy for their own reasons. “It made no sense to us either, it was just what we were ordered to do, and every time we questioned that order there was punitive action,” said Phoenix Special Agent John Dodson.

But what could be the reasons for Washington initiating such a program in the first place? Why would the Obama administration actively send 30,000 sniper rifles, assault weapons and firearms into Mexico even while claiming to follow an anti-gun stance back in the USA?

To answer that question, you need to understand P.R.S — Problem, Reaction, Solution. It is the “playbook” that governments use to get what they want, which usually involves: 1) Disarming their populations, 2) Taking away all their rights and freedoms, and then 3) Ruling over their people as tyrants with complete power.

Precisely such an effort is now underway in the United States, led by the Obama administration which has repeatedly demonstrated itself to be an enemy of the U.S. Constitution and its Bill of Rights.

How Problem, Reaction, Solution really works

If you’re the U.S. government, you can’t just announce a new program to disarm the country, end the Bill of Rights and install yourself as the King. People won’t go for it if you try to sell it that way. Instead, you need to find a way to get people to BEG you to do all that.

So you need a way to put people in a state of mind where they are terrified of drugs, terrified of guns and terrified of the border violence — to the point where they insist that somebody in Washington do something about it.

Therefore, you first need a way to cause the problem that results in all the violence that people react to. You effectively need to create violence and then wait for people to beg you to stop it.

This is where the Obama administration’s program to send 30,000 firearms into Mexico comes into play. If you want to cause gun violence and drug war violence, what better way to accomplish it than to just arm all the bad guys?

Think about it: 30,000 weapons in the hands of drug criminals! Then all you have to do is sit back and wait for all the violence to kick in. And it has kicked in — in huge numbers. Shootings on the border, kidnappings, armed conflict across the border with U.S. border agents, and so on. Violent crimes in Arizona are now being committed with these very same weapons the ATF trafficked into the hands of Mexican drug gangs.

As Judicial Watch president Tim Fitton explains, his belief is that Operation Fast and Furious was purely an anti-gun political ploy from the Obama administration, designed to put more guns into the hands of criminals as a justification for confiscating guns from all citizens. He adds, “I think another major part of this story is that the narrative of the Obama administration and the ATF is that, ‘wouldn’t it be great if we could tie guns, as part of our anti-gun agenda, to the Mexican civil war, as opposed to, you know, our lack of enforcement of the drug laws or failure to protect the borders.’” (http://dailycaller.com/2011/06/21/i…)

And here’s the real kicker: Of all the weapons now being confiscated by police in Mexico, an astonishing 70 percent came from the United States. So now you have a situation where the USA is actually arming the criminals in Mexico and destabilizing that country’s entire system of law and order. The drug gangs are at war with the police there, and thanks to thinks like U.S.-supplies AK-47s and .50-caliber sniper rifles, the drug gangs are winning!

ATF can now demand more power and bigger budgets

Getting back to the U.S. issue, if you’re the DEA or the ATF, you now have 30,000 more reasons to have your own budgets increased. There’s a wave of violence coming across the border! The drug gangs are out of control! They’re shooting back!

Well gee, I wonder why? It’s because the ATF actually sold them these 30,000 rifles under orders from Washington.

And now the Obama administration is, predictably, saying there’s so much “gun violence” in the Southern USA that new laws are needed to curb gun sales there.

Seriously? New laws? What about the 30,000 guns the ATF openly and admittedly sold to the Mexican drug gangs? Wasn’t that already a violation of law?

It all comes back to Problem, Reaction, Solution, you see. Want to keep the useless War on Drugs going a little longer? Just dump a few thousand pounds of cocaine into the hands of criminals and let ‘em run loose with it. Want to beef up the budgets of the ATF? Just distribute 30,000 illegal weapons into the hands of drug gangs and then sit back and wait for people to beg for your help. Want to justify a war on “terror” in the Middle East? Dream up some stupid story about Weapons of Mass Destruction and then launch a war.

For every power-hungry tyrannical agenda in Washington, there’s a false flag operation that will make it come true.

If the U.S. government would actively arm drug gangs, in what other ways might it betray the American people?

Now that you know the truth about how Washington put 30,000 guns into the hands of Mexican drug gangs, it naturally makes you start to wonder about the government’s involvement with things like vaccines.

Want to make people so afraid of infectious disease that they beg for vaccines? Just release an infectious disease into the population yourself! It’s a simple matter, really.

Want to get the public to beg for new food safety regulations? Just release e.coli into the food supply and then wait for the deaths to be reported in the news. All of a sudden people are demanding more food safety regulations.

Want to justify military imperialism and expansion? Just stage your own terrorist attack against your own country! Then magically find the passports of some terrorists at the scene of the crime and blame the whole thing on them.

When theory becomes fact

You see, all this used to exist solely in the realm of conspiracy theory. A few years ago, if you even suggested this kind of thing was going on, you were called a kook. But now it’s an established fact being reported by Reuters, Washington Post and other major news outlets. Now the U.S. government has been forced to admit that yes, it actively delivered 30,000 firearms into the hands of Mexican drug gangs and then intentionally stopped tracking where they went.

This is no longer conspiracy theory. It’s conspiracy FACT. And similar types of operations are being planned right now for other agendas the government has in mind: Taking away your Fourth Amendment rights, for example. How do you accomplish that? Just stage an airport terrorism attack, just like the one the TSA was caught rehearsing in Minnesota

(http://www.naturalnews.com/032458_T…).

Want to take away peoples’ Second Amendment rights? Just brainwash some low-IQ psychopath to walk into a shopping mall and start blazing away with fully automatic weapons that were provided to him by the ATF!

It’s simple, you see. Pick a topic, choose an agenda, then cause the problem yourself. Then sit back and wait for the reaction. Works every time.

The CDC pulled the same stunt back in the 1980′s with AIDS. At a time when the CDC was facing severe budget cuts, it actually hyped up the whole AIDS epidemic and started releasing complete scientific fictions as if they were fact. The disease mongering by the CDC caused widespread fear and panic across the country, earning it huge budget increases from the U.S. government.

This is all fully documented in the movie House of Numbers, by the way, using recorded video interviews from many of the key scientists involved in the whole fiasco who finally went on record to tell the truth. Almost everything you’ve been fed about AIDS is a fabrication or a distortion of the scientific truth. Watch these astonishing videos to see for yourself:

http://naturalnews.tv/v.asp?v=D35F0…
http://naturalnews.tv/v.asp?v=BE507…
http://naturalnews.tv/v.asp?v=4FE73…

The American government is working AGAINST you, not for you

The point in all this is that much of what you see happening in the world today in terms of terrorism, the drug war, infectious disease and health care are just fabricated, staged events actually pulled off by the very people who stand to benefit from the reaction!

Suckers and sheeple always believe the mainstream news at face value. They believe we’re under attack from terrorists who bring down tall buildings, or we’re being assaulted by Mexican drug gangs on the border, or we’re threatened by the Swine Flu. That’s what suckers are supposed to believe, you see: That your government is never working against you… it’s always working FOR you, right?

But intelligent people know the opposite is true: Your government is usually plotting against you and trying to figure out how to expand its power, expand its reach, reduce your freedoms and control your life. This is accomplished by unleashing the very problems that the government claims to be fighting to prevent.

The government, for example, says it’s trying to solve our nation’s economic problems. And how does it accomplish that? By generating trillions of dollars in new fiat currency and handing it over to the criminals running Wall Street. This has the net effect of stealing money from everybody else through dollar devaluation.

How does the government solve our national health care crisis? By enacting Obamacare, which mandates that more people buy into a system that has utterly failed to serve the health interests of the American people in the first place!

So at the very same time the government says it’s working to improve the economy, it’s actually stealing from you behind your back. At the very same time the government says it’s trying to stop cancer, its own health-related agencies (National Cancer Institute, for example) are openly engaged in massive disinformation campaigns that spread false information about sunlight being “dangerous” to your health (while conveniently ignoring the truth about vitamin D and its cancer preventive properties).

The government says it wants to make your food safer, and yet the USDA keeps approving genetically modified foods that are essentially massive biological experiments that cause widespread infertility and disease.

The same story goes on and on… with fluoride in the water, mercury in dental fillings, aspartame in diet sodas, pesticide use in agriculture and so on. At nearly every turn, the government itself is actively plotting against the People to keep them financially enslaved, biologically diseased and mentally ignorant.

Shipping guns into Mexico, you see, is just a tiny part of the big picture that’s going on today in the USA. The same process — Problem, Reaction, Solution — is in use almost everywhere in government at both the state and federal level.

Big Government is the enemy of peace and freedom

Bureaucrats hate to lose their jobs, and if there’s a way to stage something that makes them suddenly look more important, they won’t hesitate to roll it out. The U.S. government, just so you know, has been actively engaged in weapons trafficking, drug running and counterfeiting for decades. If you or I did what our own government does every single day, we’d be arrested as felony criminals. But when the government runs guns into Mexico, or traffics in cocaine, or prints counterfeit dollar bills that have no backing with real value, somehow it’s all okay.

Amazing how our own government has now turned into the very criminals that it claims to be protecting us against, isn’t it? Who are the real terrorists in America? The ATF agents running guns into the hands of Mexican drug gangs, of course. And the FBI agents who set up Arab-looking patsies to try to set off fake bombs that the FBI actually assembled for them!

By the way, Alex Jones (www.PrisonPlanet.com) has been covering all this for years. He’s been saying this all along, and time and time again, he’s been proven right. I realize his presentation style may seem a little intense to some people, but at the end of the day, Alex Jones is far more accurate at decoding what’s really going on behind the scenes than any mainstream news channel or newspaper. Here’s an article from InfoWars on this very topic:http://www.infowars.com/obama-admin…

I’m scheduled to host the Alex Jones show next week and will likely be discussing more about the ATF’s gun-running activities in Mexico. In the mean time, stay tuned to NaturalNews.com for more stories that aren’t afraid to report the truth about what’s really happening in our world today.

Follow

Get every new post delivered to your Inbox.

Join 403 other followers