Saturday, April 24, 2010

Pakistanis and Indians Dance to America’s Tune

[The following article is not only a good example of what is wrong with both the Pakistani and the Indian media, it is also an excellent example of how American influence distorts what and how is reported in those media. Notice that in this report, the Indian writer cited, tip-toes around the malevolent American intrusion into India's state affairs, and the Pakistani writer ignores the Indian's lack of candor and proceeds to join him in the tip-toeing around any examples that reveal the worst American intrusion into Pakistan's affairs. This is the essence of the CIA formula for subverting any nation, first make a nation's leaders complicit in criminal actions, then undertake new criminal actions which they dare not report to anyone else. The CIA helped both India and Pakistan in their attacks upon the other, now neither side dares to expose American subversion in the region, for fear of exposing their own country's complicity in those crimes.]

By Moayyed Jafri

LAHORE: India and Pakistan must work together in order to keep the American influence out of South Asia, said Prem Shankar Jha, former editor of the Economic Times, Financial Express and Hindustan Times.

Citing an example of the American influence in the region, the renowned Indian journalist said, “India has nothing to do with Afghanistan, which does not share any borders with India, but the Indians were allowed to establish their machinery by the Americans there, which implies that America would be at one hand with Pakistan and at the other with India, turning our two countries against each other”.

He said the US, intentionally or unintentionally, treats India and Pakistan differently on issues so as to develop dissent between the two countries. Thus, he said, the Afghanistan issue has particularly served as a wake-up call for both India and Pakistan, demanding that they need to develop a mutually agreed common strategy for Afghanistan, besides all other such issues where American policy line divides the neighboring nations.

Prem Shankar Jha praised former foreign minister Khurshid Mahmood Kasuri, saying that Kasuri proved himself a brave man enough to openly dismiss the much-touted allegation that Indian Prime Minister Manmohan Singh had backed out of the Kashmir resolution framework which had been agreed by both the countries.

He said Pakistan’s then president Pervez Musharraf had categorically said that he could not sell the mutually agreed framework to his nation because of the chief justice’s movement, which had made him unpopular, and thus he requested that he needed time for it all to settle.

Expressing his reservations over the recently-hyped issue of water between the two countries, he said the Aman Ki Asha dialogue has revealed that this issue has been misreported, exaggerated and intentionally whipped up by some agencies in Pakistan in order to alienate the two countries from each other, because the Kashmir issue is no longer spurring anti-India jingoistic sentiments in Pakistanis.

Stressing the importance of Aman Ki Asha project, he said, “It is so important, as it corrects opinion of the peoples through truthful information-sharing which nullifies the propaganda of certain elements who try to arouse offensive sentiments between the two nations”.

Expressing his perspective on the issue of American Influence, former Indian foreign secretary and ambassador Salman Haider said although Indians and Pakistanis perceive America differently, this does not deny importance of the fact that the two countries need to work against the American influence which has the tendency to disturb Indo-Pak relations.

He said the intent of America cannot be doubted totally, because India is among the top growing economic powers in the world and the US wants to tap into this huge market.

Talking about the dissent and a level of anger that exists in the Pakistanis towards India, he said he is not offended by the sentiments of Pakistanis, as it will take some time for building neutral opinion of the masses through untainted information-sharing, for which Aman ki Asha provides a perfect platform. However, he maintained, all this necessitates time and persistent efforts as there has been a lot of negativity in the past.

Commenting on India’s reaction in the event of a civil nuclear pact with America, he said although it is dealing strictly between Pakistan and the US, there is a distinct possibility that India will have concerned issues with it, just like Pakistan had when the civil nuclear pact between America and India came about.

Much of this has to do with the fact that both the countries do not know what the level of cooperation is extended by the US to either of them which raises concern over perceived threat from each other.

Admiral (Retd) K. Nayyar said a young girl approached him after the dialogue and questioned why India is bent upon killing Pakistani agriculture and people by inflicting a drought through violation of the Indus water treaty.

He said, “This is what misinformation has brought about, and that is why the perspective of the people of both the countries hosts grievances, anger and even aggression”. He said if such propaganda is not checked, the pursuance of peace will meet failure.

He said if the misconceptions harbored by the people of both the nations over the water issue are not removed immediately by the governments, it may develop into the most destructive contention. All the three intellectuals, despite their diverse fields, agreed that there is a need to acknowledge each other’s issues, even if they have serious differences.

Tuesday, April 20, 2010

Pentagon's Cyber Command: Civilian Infrastructure a "Legitimate" Target


When U.S. Secretary of Defense Robert M. Gates launched Cyber Command (CYBERCOM) last June, the memorandum authorizing its stand-up specified it as a new "subordinate unified command" under U.S. Strategic Command (STRATCOM), one that "must be capable of synchronizing warfighting effects across the global security environment as well as providing support to civil authorities and international partners."

As Antifascist Calling reported at the time, Gates chose Lt. General Keith Alexander, the current Director of the National Security Agency (NSA), to lead the new DOD entity. The agency would be based in Ft. Meade, Maryland, where NSA headquarters are located and the general would direct both organizations.

In that piece I pointed out that STRATCOM is the successor organization to Strategic Air Command (SAC). One of ten Unified Combatant Commands, STRATCOM's brief includes space operations (military satellites), information warfare, missile defense, global command and control, intelligence, surveillance and reconnaissance (ISR), as well as global strike and strategic deterrence, America's first-strike nuclear arsenal.

Designating CYBERCOM a STRATCOM branch all but guarantees an aggressive posture. As an organization that will unify all military cyber operations from various service branches under one roof, CYBERCOM will coordinate for example, Air Force development of technologies to deliver what are called "D5 effects" (deceive, deny, disrupt, degrade and destroy).

Ostensibly launched to protect military networks against malicious attacks, the command's offensive nature is underlined by its role as STRATCOM's operational cyber wing. In addition to a defensive brief to "harden" the "dot-mil" domain, the Pentagon plan calls for an offensive capacity, one that will deploy cyber weapons against imperialism's adversaries.

As a leading growth sector in the already-massive Military-Industrial-Security-Complex, the cyberwar market is hitting the corporate "sweet spot" as the Pentagon shifts resources from Cold War "legacy" weapons' systems into what are perceived as "over-the-horizon" offensive capabilities.

In association with STRATCOM, the Armed Forces Communications and Electronics Association (AFCEA), will hold a Cyberspace Symposium, "Ensuring Commanders' Freedom of Action in Cyberspace," May 26-27 in Omaha, Nebraska.

Chock-a-block with heavy-hitters in the defense and security world such as Lockheed Martin, HP, Booz Allen Hamilton, CACI, Cisco, CSC, General Dynamics, QinetiQ, Raytheon and the spooky MITRE Corporation, the symposium seeks to foster "innovation and collaboration between the private sector and government to delve into tough cyber issues." The shin-dig promises to "feature defense contractors and government agencies showcasing their solutions to cyberspace and cyber warfare issues."

During pro forma hearings before the Senate Armed Services Committee (SASC) April 15, Alexander's testimony was short on specifics, as were his written responses to "Advance Questions" submitted to the general by the SASC.

During Thursday's testimony, Alexander told the Senate panel that the command "isn't about efforts to militarize cyberspace," but rather "is about safeguarding the integrity of our military's critical information systems."

"If confirmed" Alexander averred, "I will operate within applicable laws, policies and authorities. I will also identify any gaps in doctrine, policy and law that may prevent national objectives from being fully realized or executed."

What those "national objectives" are and how they might be "executed" are not publicly spelled out, but can be inferred from a wealth of documents and statements from leading cyberwar proponents.

As we will explore below, despite hyperbole to the contrary, CYBERCOM represents long-standing Pentagon plans to militarize cyberspace as part of its so-called "Revolution in Military Affairs" and transform the internet into an offensive weapon for waging aggressive war.

"Switching Cities Off"

While we do not know how Pentagon assets will be deployed, we can be certain their destructive potential is far-reaching. We can infer however, that CYBERCOM possesses the capacity for inflicting irreparable harm and catastrophic damage on civilian infrastructure, and that power grids, hospitals, water supply systems, financial institutions, transportation hubs and telecommunications networks are exquisitely vulnerable.

The potential for catastrophic violence against cities and social life in general, has increased proportionally to our reliance on complex infrastructure. Indeed, most of the networks relied upon for sustaining social life, particularly in countries viewed as adversaries by the United States would be susceptible to such attacks.

In densely populated cities across Africa, Asia, Latin American and the Middle East, even a small number of directed attacks on critical infrastructural hubs could cause the entire network to collapse. The evidence also suggests that the Pentagon fully intends to field weapons that will do just that.

As the National Journal reported in November, in May 2007, "President Bush authorized the National Security Agency, based at Fort Meade, Md., to launch a sophisticated attack on an enemy thousands of miles away without firing a bullet or dropping a bomb."

According to investigative journalist Shane Harris, during the Iraq "surge" Director of National Intelligence Mike McConnell, requested and received an order from President Bush for an "NSA cyberattack on the cellular phones and computers that insurgents in Iraq were using to plan roadside bombings."

While corporate media, the Pentagon and the security grifters who stand to make billions of dollars hyping the "cyberwar threat" to gullible congressional leaders and the public, the DOD, according to Harris, "have already marshaled their forces."

Bob Gourley, who was the chief technology officer for the Defense Intelligence Agency told Harris: "We have U.S. warriors in cyberspace that are deployed overseas and are in direct contact with adversaries overseas," and that these experts already "live in adversary networks."

While the specter of a temporary "interruption of service" may haunt modern cities with blackout or gridlock, a directed attack focused on bringing down the entire system by inducing technical malfunction across the board, would transform "the vast edifices of infrastructure" according to geographer and social critic Stephen Graham, into "so much useless junk."

In his newly-published book, Cities Under Siege, Graham discusses the effects of post-Cold War U.S./NATO air bombing campaigns in Iraq, Afghanistan and the former Yugoslavia as a monstrous instrumentality designed to inflict maximum damage and thereby coerce civilian populations into abandoning resistance to the imperialist hyperpower: the United States.

Much the same can be said of America's "stationary aircraft carrier" in the Middle East, Israel, during its murderous bombing campaign and ground invasion of Gaza during 2008-2009, which similarly targeted civilian infrastructure, reducing it to rubble.

"The effects of urban de-electrification" Graham writes, "are both more ghastly and more prosaic: the mass death of the young, the weak, the ill, and the old, over protracted periods of time and extended geographies, as water systems and sanitation collapse and water-borne diseases run rampant. No wonder such a strategy has been called a 'war on public health,' an assault which amounts to 'bomb now, die later'."

Although critics such as James Der Derian (see: Virtuous War) argue that "new forms of control and governance" are made possible by the modern surveillance state and that "the speed of interconnectivity that the computer enables has, more than any other innovation in warfare from the stirrup to gunpowder to radar to nukes, shifted the battlefield away from the geopolitical to the electromagnetic," exactly the opposite is the case.

Searching for "clean," "sanitized" modes of waging high-tech, low casualty war (for the aggressors), U.S. Cyber Command has been stood-up precisely to deliver the means that enable America's corporate and political masters to "switch cities off" at will, as a tool of economic-political domination.

In this respect, the "electromagnetic" is fully the servant of the "geopolitical," or as Guy Debord reminds us in The Society of the Spectacle: "The current destruction of the city is thus merely one more reflection of humanity's failure, thus far, to subordinate the economy to historical consciousness; of society's failure to unify itself by reappropriating the powers that have been alienated from it."

Part of that "alienation" resides in the chimerical nature of imperialism's quest for high-tech "silver bullets" to assure its continued domination of the planet, despite evidence to contrary in the form of the slow-motion meltdown and collapse of the capitalist economy. The fact is, despite the decidedly "low-tech," though highly-effective, resistance of the people of Iraq, Palestine and Afghanistan, our masters will continue to pour billions of dollars into such weapons systems to stave off their "rendezvous with history."

While Pentagon Press Secretary Geoff Morrell went to great lengths last year to downplay the offensive role envisaged for Cyber Command, others within the defense bureaucracy are far more enthusiastic.

In a 2008 piece published by Armed Forces Journal, Col. Charles W. Williamson wrote that "America needs a network that can project power by building an af.mil robot network (botnet) that can direct such massive amounts of traffic to target computers that they can no longer communicate and become no more useful to our adversaries than hunks of metal and plastic. America needs the ability to carpet bomb in cyberspace to create the deterrent we lack."

Alexander's equivocal written responses were hardly comforting, nor did they blunt criticism that the Pentagon fully intends to stand-up an electromagnetic equivalent of Strategic Air Command. While promising that CYBERCOM would be "sensitive to the ripple effects from this kind of warfare," as The New York Times delicately put it, Alexander sought to blunt criticism by averring that the Pentagon "would honor the laws of war that govern traditional combat in seeking to limit the impact on civilians."

In written responses to Senate, Alexander went to great lengths to assure the SASC that military actions would comply with international laws that require conformity with principles of military necessity and proportionality.

However, as the Times pointed out, Alexander agreed with a question submitted by the Senate that "the target list would include civilian institutions and municipal infrastructure that are essential to state sovereignty and stability, including power grids, banks and financial networks, transportation and telecommunications."

During questioning by SASC Chairman Carl Levin (D-MI) Thursday, how CYBERCOM would respond to an attack "through computers that are located in a neutral country," Alexander was far more ambiguous. He responded that would "complicate" matters, particularly when it came to the critical question of "attribution."

Despite matters being "complicated" by the fog of war, Alexander didn't rule out an attack on a presumably "neutral" country, even one that unwittingly serves as a "path through."

"Offensive cyber weapons" Alexander wrote, "would only be authorized under specific lawful orders by the [Defense Secretary] and the president and would normally come with supplemental rules of engagement."

While true as far as it goes (which isn't very far!) Alexander's boss, General Kevin Chilton, STRATCOM's commander suggested last year that "the White House retains the option to respond with physical force--potentially even using nuclear weapons--if a foreign entity conducts a disabling cyber attack against U.S. computer networks." (emphasis added)

According to Global Security Newswire, during a Defense Writers Group breakfast last May Chilton told journalists, "I think you don't take any response options off the table from an attack on the United States of America. Why would we constrain ourselves on how we respond?"

Chilton went on to say that "I think that's been our policy on any attack on the United States of America. And I don't see any reason to treat cyber any differently. I mean, why would we tie the president's hands? I can't. It's up to the president to decide."

Hardly comforting words.

In response to an SASC query, Alexander wrote that as Commander his duties include "executing the specified cyberspace missions" to "secure our freedom of action in cyber space."

Among other things, those duties entail "integrating cyberspace operations and synchronizing warfighting effects across the global security environment." According to it's charter, the command will "direct global information grid operations and defense" and execute "full-spectrum military cyberspace operations."

The command will serve "as the focal point for deconfliction of DOD offensive cyberspace operations;" in other words, it will coordinate and act as the final arbiter amongst the various armed branches which possess their own offensive cyber capabilities.

In the Pipeline

Contemporary military doctrine in the United States, but also in Israel, has emphasized the use of overwhelming force as a means to eradicate civilian infrastructure and break a population's resistance, what Graham has called "the systematic demodernization and immobilization of entire societies classified as adversaries."

Whether such force is applied through "traditional" means, aerial bombing preceded or followed by crippling economic sanctions as in Iraq and Palestine, or by the deployment of more "modern" means, cyberwar, state terror has as its primary target the civilian population and crafts its tactics so as to ensure maximal levels of psychological coercion.

This is fully consonant with the Pentagon's goal to transform cyberspace into an offensive military domain. In a planning document, since removed from the Air Force web site, theorists averred:

Cyberspace favors offensive operations. These operations will deny, degrade, disrupt, destroy, or deceive an adversary. Cyberspace offensive operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries. We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction and attack, network attack, and infrastructure attack operations. Targets include the adversary's terrestrial, airborne, and space networks, electronic attack and network attack systems, and the adversary itself. As an adversary becomes more dependent on cyberspace, cyberspace offensive operations have the potential to produce greater effects. (Air Force Cyber Command, "Strategic Vision," no date, emphasis added)

U.S. campaigns in Afghanistan, Iraq and Yugoslavia and Israeli aggressive wars against Gaza, the West Bank and Lebanon, demonstrate forcefully that contemporary military doctrine now strives to develop the capacity to systematically degrade, as a means of controlling through threats or actual attacks, the infrastructural "glue" that bind entire nations together. There can be no doubt that the Air Force's "Strategic Vision" is now fully integrated into CYBERCOM.

As well, with increasing reliance by the state and its military on high-tech methods of waging war for economic-political-social domination, the self-same methods are appropriated and deployed within heimat societies themselves. Hence, escalating securitization schemes (warrantless wiretapping, watch listing and indexing of "suspect" citizens) are the handmaidens of a generalized militarization of daily life.

What then, are some of the features and future weapons systems being explored by CYBERCOM and their corporate partners? The SASC as part of its confirmation process of General Alexander, has provided a useful summary, Building Cyberwarfare Capabilities in Public Documents.

If anything, the examples cited below clearly demonstrate that CYBERCOM is quietly seeing to it that the "mismatch between our technical capabilities to conduct operations and the governing laws and policies," as Alexander wrote to the SASC, for waging aggressive cyberwar will soon be resolved.

Dominant Cyber Offensive Engagement and Supporting Technology
BAA-08-04-RIKA [BAA, Broad Agency Announcement]
Agency: Department of the Air Force
Office: Air Force Materiel Command
Location: AFRL [Air Force Research Laboratory]-Rome Research Site
Posted on fbo.gov: June 13, 2008


"Solutions to basic and applied research and engineering for the problems relating to Dominant Cyber Offensive Solutions to basic and applied research and engineering for the problems relating to Dominant Cyber Offensive Engagement and Supporting Technology are sought. This includes high risk, high payoff capabilities for gaining access to any remotely located open or closed computer information systems; these systems enabling full control of a network for the purposes of information gathering and effects based operations."

"Also, we are interested in technology to provide the capability to maintain an active presence within the adversaries information infrastructure completely undetected. Of interest are any and all techniques to enable stealth and persistence capabilities on an adversaries infrastructure. This could be a combination of hardware and/or software focused development efforts. Following this, it is desired to have the capability to stealthily exfiltrate information from any remotely-located open or closed computer information systems with the possibility to discover information with previously unknown existence. Any and all techniques to enable exfiltration techniques on both fixed and mobile computing platforms are of interest. Consideration should be given to maintaining a 'low and slow' gathering paradigm in these development efforts to enable stealthy operation. Finally, this BAA's objective includes the capability to provide a variety of techniques and technologies to be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects."

Air Force PE 0602788F: Dominant Information Technology

FY 2011 Base Plans: "Continue development of information system access methods and development of propagation techniques. Continue development of stealth and persistence technologies. Continue development of the capability to exfiltrate information from adversary information systems for generation of actionable CybINT. Continue technology development for preparation of the battlefield and increased situational awareness and understanding. Continue development of technology to deliver D5 effects. Continue development of autonomic technologies for operating within adversary information systems. Continue development of techniques for covert communication among agents operating within adversary information systems. Continue analysis of proprietary hardware and software systems to identify viable means of access and sustained operations within the same. Continue development of a publish/subscribe architecture for exchange and exfiltration of information while operating within development of a publish/subscribe architecture for exchange and exfiltration of information while operating within adversary information systems. Initiate development of techniques to deliver PsyOps via cyber channels. Develop deception techniques to allow misdirection and confusion of adversary attempts to probe and infiltrate AF systems."

As Washington Technology reported in February, "Lockheed Martin Corp. will continue to work with the Defense Advanced Research Projects Agency to help develop a governmentwide cybersecurity initiative under a $30.8 million contract."

That initiative, the National Cyber Range will "provide a revolutionary, safe, fully automated and instrumented environment for U.S. cybersecurity research organizations to evaluate leap-ahead research, accelerate technology transition, and enable a place for experimentation of iterative and new research directions," according to DARPA.

Target, acquired...

Saturday, April 17, 2010

The Gang of Czech Jews around the Collapses of 9-11




The Dirty Business Behind the 9-11 Clean-up

By Christopher Bollyn,

www.bollyn.com

April , 2010

The discovery by Professor Steven Jones of tiny chips of super-thermite in the dust of the World Trade Center has greatly improved our understanding of what happened on 9-11. With this evidence in hand we have a much better understanding of how the Twin Towers were pulverized. The crucial questions about 9-11 remain: Who made this nanotech super-thermite? And who put it in the Twin Towers?


The red-gray chips of super-thermite found in the dust of the pulverized World Trade Center have fundamentally changed our understanding of what happened on 9-11.

Seeing that an advanced nano-composite form of thermite was used to demolish the buildings, we can now understand that the clean-up was actually a well-planned operation to remove and destroy the evidence of the crime. Every aspect of the well-planned false flag terror atrocity of 9-11 was completely controlled and compartmentalized, the hallmarks of a Mossad (Ehud Barak) operation. Every part of the operation is carried out by people and companies that are controlled by the architects of terrorism. They are all essentially part of the same team - the Israeli terror team - and can be controlled and trusted, from the top down. With this in mind, we begin our review of the people who cleaned up the World Trade Center.


THE RESCUE CHIEF - From September 12, 2001 until July 11, 2002, Martin Seigel of Freehold, New Jersey, was "rescue chief" and director of field operations for Bovis Landfill, which won the contract to clear the debris of the World Trade Center. (Photo from Aftermath by Joel Meyerowitz)

"From 12 September until 11 July," Martin Seigel (sometimes written Marty Siegel), "was director of field operations, overseeing the rescue on behalf of Bovis Landfill, which won the contract to clear the debris," The Observer (U.K.) reported on August 18, 2002. How was Bovis chosen so quickly? one might ask. Martin Seigel began working on the pile of rubble already on September 12, 2001? How did a subsidiary of Bovis Lend Lease, a British-owned company headed by Frank Lampl ("Life President" of the company) win the contract in less than one day? What kind of selection process was used? Why such haste to hire companies to remove the debris - before the bodies are recovered and the evidence is examined?

One has to understand that 9-11 was planned well in advance, which means that the removal and destruction of the evidence was also planned to be assigned to companies that could be trusted to follow orders and keep secrets. There is no way that the architects of the false flag terror of 9-11 were going to let honest engineers anywhere near the evidence of the crime. The World Trade Center is owned by the Port Authority of New York and New Jersey so it stands to reason that Bovis Lend Lease was chosen by Lewis Eisenberg then director of the Port Authority (until December 2001). Eisenberg, as chairman of the Port Authority of New York and New Jersey, personally arranged the privatization of the World Trade Center property and oversaw the negotiations that delivered the leases into the private hands of Silverstein and Lowy. (See - "The Zionists Who Gained from 9-11"). Eisenberg is part of the Zionist circle of 9-11 culprits.


Frank Lampl, a Czech Jew, is "Life President" of Bovis Lend Lease

Frank Lampl, the "Life President" of Bovis Lend Lease, is a Jew from Brünn (Brno) who emigrated to Britain in 1968. According to his biography, his son Thomas was studying at Oxford University in 1968 when Frank and his wife decided to leave Czechoslovakia. He joined Bovis in 1971 and rose quickly to become chief executive of Bovis International in 1978. Bovis has done many large jobs in the United States, including the construction management contract for the Atlanta Olympic Games.

Sir Frank Lampl (knighted by the Queen) is the first Honorary President of the Czech British Chamber of Commerce, a position he has held since March 2009. He has also established a branch of Bovis in Brno, his hometown in the Czech Republic. Bovis has two locations in Brno, one at the hospital and another near the technical university, where nanotechnology is developed.

Lampl's Bovis Lend Lease is a company that has long been engaged in nanotechnology research as well. Since the 1990s, Bovis has been involved in the development of nanotechnology labs, such as those in which the super-thermite used on 9-11 was made. Bovis company archives indicate that the company has been involved in nanotechnology production since at least October 2000. (See: Bovis Lend Lease Launches New Pharmaceutical Business, October 30, 2000.)

Did Bovis produce the super-thermite that pulverized the Twin Towers? It's certainly possible. Was the nano-thermite of 9-11 made in the Czech Republic? It's also possible.

The CV of design manager Richard Paley, former Principal Architect at Bovis Lend Lease, indicates that he was designing nanotechnology clean rooms for Bovis Lend Lease for the better part of a decade, starting with a 4 year stint from October 1990 until October 1994:

Senior Architect
Bovis Lend Lease
(Public Company; LLC; Construction industry)

October 1990 — October 1994 (4 years 1 month)
[Employed by Tanvec Ltd , bought by Bovis Lend Lease in 1999] - Role involved design of cleanrooms , laboratories and production facilities for the pharmaceutical, biotechnology, and process industries. Responsible for compliance with planning and building regulations and compliance with MHRA and FDA regulations.

See: Richard Paley CV

Sir Frank Lampl is also a friend of Ehud Barak, the Israeli minister of defense who is responsible for the war crimes committed in Gaza in Israel's operation "Cast Lead" of December 2008 and January 2009. Some 1,400 Palestinian civilians were killed in this criminal assault on the people of the Gaza Strip. In October 2009, Sir Frank Lampl, a partner of Forum 2000, sponsored an international conference in which Ehud Barak was one of the key speakers. Why would Ehud Barak, an Israeli terrorist who should be arrested for war crimes, be allowed to speak at an international forum on "Democracy and Freedom" in Prague in 2009? What is the real connection between Israeli criminals and the Czech Republic?


Ehud Barak, indicted for serious war crimes by the Goldstone Report, spoke at Forum 2000 in October 2009, an event sponsored by Sir Frank Lampl. What a small world.

Frank Lampl's connection with Ehud Barak is most telling. This is the inner circle of 9-11. These are the key suspects in the false flag terror atrocity of 9-11. Barak is the senior architect of the terror attacks and Lampl was the loyal Zionist Jew who helped destroy the evidence.

(...to be continued...)

Sources and Recommended Reading:

Bollyn, Christopher, "Foreign Firms Destroyed Crucial Evidence," August 14, 2002
http://www.bollyn.com/foreign-firms-destroyed-crucial-evidence

Bollyn, "The Zionists Who Gained from 9-11," June 19, 2002
http://www.bollyn.com/the-zionists-who-gained-from-9-11

Sir Frank Lampl, Czech British Chamber of Commerce Honory President, March 2, 2009
http://www.cbcc.org.uk/Events-Promotions.aspx?News=20

Bovis Lend Lease Launches New Pharmaceutical Business, 30 October 2000
http://www.lendlease.com.au/llweb/bll/main.nsf/all/news_20001030

"Ehud Barak, Israel's Defense Minister and Former Prime Minister" by Pierre Tristam
http://middleeast.about.com/od/israel/p/me090102.htm

"9/11 - one year on - 'Butterflies rose out of the debris'", Sean O'Hagan, The Observer, 18 August 2002
http://www.guardian.co.uk/world/2002/aug/18/september11.usa1

Richard Paley’s Experience, Design Manager & Chartered Architect
http://uk.linkedin.com/in/richarddpaley

The Gang of Czech Jews around the Collapses of 9-11....

April , 2010

Anders Björkman's article about the collapse of the World Trade Center entitled, "Discussion of 'What Did and Did Not Cause Collapse of World Trade Center Twin Towers in New York' by Bazant, Le, Greening and Benson" is scheduled for publication in the July 2010 issue of the Journal of Engineering Mechanics.


Fig. 6 - "Crush down" between floors 85 and 75. Upper Part C is evidently not visible, nor is Part B - Rubble/debris. It should be clear to everybody that WTC 1 is now blown apart by energy released inside the tower as described here.

In his recent posting "What did and did not Cause Collapse of WTC Twin Towers in New York," Björkman wrote:

The Bazant theory can evidently not be verified in a laboratory or in reality for any structure of any size...

No structure of any size can be crushed by an upper part of itself from top down by gravity...

Question remains why Bazant & Co suggest the opposite? It is insane! Are Bazant & Co part of the conspiracy to destroy the WTC at NY?

BAZANT AND THE CZECH JEWS OF 9-11

Is Zdenek Bazant part of the conspiracy to destroy the World Trade Center? Bazant is the Czech Jew who had a scientific paper ready - one day after 9-11 - to provide an explanation for how the Twin Towers were collapsed and pulverized - without explosives. Frank Lampl is the Czech Jew whose company, Bovis Lend Lease, cleaned up the rubble of the World Trade Center, which had been leased by Frank Lowy, another Czech Jew, who had obtained the lease to the towers with Larry Silverstein just 6 weeks before they were destroyed.

What is it with these Czech Jews and 9-11? Is this an international gang of criminals or what? Are they connected to the Czech Jew Madeleine Korbel Albright (born Marie Jana Korbelová in Prague, May 15, 1937) daughter of Josef Korbel, the mentor of George W. Bush's Secretary of State, Condoleezza Rice? What a small world.

Sources and Recommended Reading:

"The Dirty Business Behind the 9-11 Clean-up," April 11, 2010
http://www.bollyn.com/index.php#article_12088

"Fire Did Not Collapse WTC - Swedish Structural Engineer," January 8, 2008
http://www.bollyn.com/fire-did-not-collapse-wtc-swedish-structural-engineer

Monday, April 12, 2010

Main Core, PROMIS and the Shadow Government

by Ed Encho

"In a very real and terrifying sense, our Government is the CIA and the Pentagon, with Congress reduced to a debating society. Of course, you can't spot this trend to fascism by casually looking around. You can't look for such familiar signs as the swastika, because they won't be there. We won't build Dachaus and Auschwitzes; the clever manipulation of the mass media is creating a concentration camp of the mind that promises to be far more effective in keeping the populace in line."

-Earling Carothers ‘Jim’ Garrison



II: The Shadow Government

To say that the 'terrorist' attacks on the World Trade Center and Pentagon were an incredible boon to the shadow government and its long running agenda would be quite the understatement. Never before in American history has this particular element been so visible and brazen than in the aftermath of 9/11 which has since become the ultimate trump card to be played against the forces of reason, judiciousness and the rule of law. The frenzied spree to dismantle the republic and reinterpret the Constitution to implement the fascist police state that would suppress the domestic populace while the business of expanding the empire abroad has gone on unabated for over seven years now. The ascendance of the shadow government into the open began on that morning and the events have been instrumental in allowing for every outrageous violation of civil liberties, international law and the very bedrock principle upon which civilized societies are built being habeas corpus. America is now known worldwide as a torture state, a pariah and a rogue nation to be hated and feared and is ruled by an imperial presidency or as it is formerly known a Unitary Executive (translation: dictator). The current state of affairs are primarily due to the policies of the cabal of one Richard B. Cheney, the most powerful Vice President in history as well as a longtime shadow government figure who activated Continuity of Government on the morning of 9/11.

Cheney and Donald Rumsfeld who have been collaborators in a war against the basic tenets of American Constitutional democracy since their days together in the Ford administration were active participants in Continuity of Government throughout the Reagan years and afterwards. With C.O.G. being highly secretive it is not widely known due to a lack of official media coverage of the programs so few questions have been asked, no oversight exists and it has been a useful place for a renegade cabal with an acute distaste for democratic principles. One of the most often referenced pieces on this was James Mann's 2004 piece for the Atlantic Magazine entitled The Armageddon Plan. Another shadow government figure who would later become instrumental in the transformation of America into the fascistic Homeland is one David Addington, Cheney's crackerjack legal mind and longtime hatchetman who has along with others such as John Yoo (a man who once said that the president had the legal authority to crush a child's testicles were it deemed necessary) have toiled to change the law of the nation into something dark and foreign. In Addington's world there is legitimacy to engage in illegal (at least until now) domestic spying, abduction and detention without trial, torture both physical and mental (a horrifying example is that of Jose Padilla (an American citizen who would be the precedent for future actions against other Americans) who was imprisoned and psychologically destroyed through the application of mind control techniques straight out of the infamous CIA program MKULTRA to the point where his mental capacities were that of "a piece of furniture". Padilla was not only a precedent setter but also a warning of what the government could do to a person deemed to be a 'terrorist' or 'terrorist sympathizer', the definitions of which are intentionally vague for a very terrifying reason.

David Addington, more than once referred to as Cheney's Cheney was a key player in the implementation of the shadow government infrastructure now that it has come out from under the cover of darkness in the post-9/11 era. Jane Meyer of the New Yorker speaks of their relationship in the following interview from which I excerpt a piece from here:
How did David Addington get to know Vice-President Cheney, and how long have they worked together?

They met on Capitol Hill in the mid-eighties, when Cheney was a Republican congressman from Wyoming and Addington was a young staff lawyer working for the House Intelligence and Foreign Affairs committees. So they have worked together for about two decades. Their partnership was cemented when they worked together on the Minority Report on the Iran-Contra affair. Both Addington and Cheney took the idiosyncratic position that it was Congress, not President Reagan, that was in the wrong. This view reflected the opinion, held by both men, that the executive branch should run foreign policy, to a great extent unimpeded by Congress. It’s a recurring theme—pushing the limits of executive power and sidestepping Congress—in their partnership. One example is their position that the President, as Commander-in-Chief in times of war, had the inherent authority to ignore the Foreign Intelligence Surveillance Act, which Congress passed in an effort to make sure that Presidents don’t violate citizens’ right to privacy by spying on them without warrants.

After meeting and working together in Congress, Cheney and Addington continued their partnership at the Pentagon, where, during the Presidency of George H. W. Bush, Cheney was Secretary of Defense and Addington was his special assistant and, later, general counsel. There, Addington was known as a powerhouse, a stickler who controlled access to Cheney and marked up others’ memos in red felt-tipped pen, returning the memos for rewrites that would make them sharper—and more protective of executive power.

At the Pentagon, the two exhibited a similar pessimism about world affairs, in particular about the possibility that Mikhail Gorbachev represented true change, and also an unusually deep interest in “continuity of government” planning—how the government survives in the event of a doomsday attack. Addington kept the constitutional provisions for Presidential succession in his pocket at all times, a colleague told me.
Addington is still largely a mystery man but his connections to Continuity of Government during the Reagan era are documented as well as his ties to Cheney. Another common denominator is the Iran-Contra affair, Addington was a big player in it as well as most of the current crop of neocons who returned to power under Bush II. Addington also is connected to spook master and former CIA head William 'Bill' Casey (a man whose history and past associations is a veritable almanac of American fascism dating from WWII through the Reagan years and who played a key role in the theft of the PROMIS software) through The Lawless Group (named for CIA operative Richard Lawless, a close associate of Casey). Sidney Blumenthal's article for Salon entitled The Sad decline of Michael Mukasey provides some additional background on Mr. Addington:
Addington's dominion over the law -- controlling the writing of the president's executive orders and the memos from OLC, the office of the White House counsel and the carefully placed network of general counsels throughout the federal government's departments and agencies -- is a well-established and central aspect of Cheney's power. Addington has been indispensable to the vice president since he served as his counsel on the joint congressional committee investigating the Iran-Contra scandal, when Cheney was the ranking minority member. In that capacity, Addington wrote, under Cheney's signature, the notorious minority report that was an early clarion call for the imperial presidency.

Addington and Cheney's report decried Congress for its "hysteria" over the Iran-Contra scandal, which involved the selling of missiles to Iran to finance arms for the Nicaraguan Contras against explicit congressional legislation. The Constitution, they argued, "leaves little, if any doubt that the president was expected to have the primary role of conducting the foreign policy of the United States." They added: "Congressional actions to limit the president in this area therefore should be reviewed with a considerable degree of skepticism. If they interfere with the core presidential foreign policy functions, they should be struck down."

The Cheney minority report was the doctrinal basis for the Bush presidency: the unitary executive, the commander in chief ruling in wartime by fiat and, ultimately, torture being defined as whatever the president, not the Geneva Conventions, said it was. Addington's authorship of the Cheney Iran-Contra report was largely overlooked until fairly recently, but his deeper connection to that scandal and its resonance have received little attention.

In the 1980s, Addington, then in his 20s, served as deputy counsel to CIA director William Casey, the moving force behind the Iran-Contra affair and the most powerful figure in the Reagan administration after the president. Along with other hotshots in the counsel's office, Addington was part of what became known within the agency as the "Lawless Group," named after Richard Lawless, a CIA operative who was a close assistant to Casey, according to a former senior CIA official. After Casey's death, Rep. Dick Cheney co-opted the "Lawless Group," putting its members in key positions when he was secretary of defense during the first Bush administration and vice president in the second. (Lawless, for example, after working as Jeb Bush's business partner, served as deputy undersecretary of defense, retiring this past April.)

"A lot of the decisions on Iran-Contra were signed off by the counsel's office," a longtime senior CIA official told me. "It was not a renegade operation. It had lawyers, just like now. Everything they were doing was run by the general counsel's office and Addington was deputy. You may draw your own conclusions, as the Russians say." In fact, the role of the counsel's office surfaced in the trial of Alan Fiers, the CIA agent in charge of the Central American Task Force, who pleaded guilty to misleading Congress. But that role was never investigated or ever really reported.

"These guys don't like the mainstream CIA. In fact, they hate it," the CIA official explained. "They don't like information unless it fits what they want to hear. They hate the CIA because the CIA tells them what they don't want to hear. They want assessments that prove ideological points. They are looking for simplistic answers to complicated issues. They inhabit a make-believe world of moving up into perceived areas of expertise. It's the same guys; they all resurface when Republicans are back in power. It's the same group. It's a system. The similarities are amazing in all these wars we've been dragged into."
That 9/11 enabled Cheney, Addington and the rest of the neocons to brutally enforce their long planned agenda and has served as the basis for all that has changed since that day there remains a truly legitimate question as to what their role or knowledge of those attacks may have been. It has been a matter of intense debate in the alternative media as to what level of involvement that this cabal may have had in ensuring that the attacks took place (stay away from the Bush Did It canard which is only a straw man), they did after all write in a document for the Project For A New American Century (PNAC) entitled Rebuilding America's Defenses of the need for a "New Pearl Harbor" in order for the public to accept their radical doctrine and there never has been a legitimate investigation of 9/11 free of conflicts of interest and with full subpoena power so as to ask the serious questions in a public forum about the event that hit the reset button on over two and a quarter centuries of American history and the subsequent implementation of a fascist infrastructure.

In a fairly recent article that I wrote entitled 9/11: Cover for a Coup d'Etat?, I mused as to whether the 'terrorist' attacks merely provided cover for an Edward Luttwak style coup d'etat to be piggybacked on top of the incidents using the Continuity of Government infrastructure. The massive USAPATRIOT Act was already awaiting a rollout and there is the still lingering question of who was really behind the Anthrax attacks that were directed at those who were in positions to stop its implementation. 9/11 would be consistent with historical black operations and false flag attacks and the festering disregard for American democracy by those who assumed control in the aftermath is widely known but I am not going to revisit that in this particular writing other than to ask the obvious question of Cui Bono? Whether 9/11 was indeed a coup by an alliance between the shadow government along with rogue elements of foreign intelligence services is of less importance than the consistent pattern of below the surface influence and interactions of non-elected government officials and foreign and domestic criminal elements. Author and researcher Professor Peter Dale Scott refers to a "Deep State" and I would refer readers of this article to one of his entitled 9/11, Deep State Violence and the Hope of Internet Politics in which Professor Scott provides an in depth look into not only the deep state but asks serious questions about whether Continuity of Government was implemented in the aftermath of 9/11. I excerpt the following from this piece:
In my book The Road to 9/11, I have argued that there has existed, at least since World War Two if not earlier, an analogous American deep state, also combining intelligence officials with elements from the drug-trafficking underworld. I also pointed to recent decades of collaboration between the U.S. deep state and al-Qaeda, a terrorist underworld whose drug-trafficking activities have been played down in the 9/11 Commission Report and the mainstream U.S. media.
The book referenced by Professor Scott is The Road to 9/11: Wealth, Empire and the Future of America and it is an essential read for those seeking to understand America as it exists today.

Pictures of the Homeland

That the United States of America has nearly completed the tragic transition to a fascist form of government becomes more apparent with each passing day and each additional outrage and the cancer has so thoroughly metastasized there is little hope that a new regime in Washington is going to be able to bring it to a hald. Whether it be the hijacking of the financial system by the Wall Street banking cartel that is abetted by yet another capitulation by a quisling Congress, more evidence of the desecration of privacy rights by a surveillance industrial complex run amok, the alarming and ongoing militarizing of the nation’s police, the assignment of combat hardened troops to domestic duty (with a mandate to quell civil unrest despite the now for all intents and purposes rendered irrelevant Posse Comitatus Act) or the constantly morphing and open ended definition of what exactly constitutes being a ‘terrorist’ to name only a few of the more alarming changes to the republic, those who are able to recognize such things as what they truly are should be increasingly aware that the dreaded and ubiquitous pejorative of conspiracy theorist is (as it always has been) one gigantic sick joke. The pushback against President Obama for announcing the planned closure of the Gitmo torture gulag by the neocon embeds in the media has been significant.

As the saying goes, if you put a frog into a pot of boiling water it will react by jumping out immediately, but if you put that same frog into a pot of lukewarm water and then very slowly increase the temperature of the burner on the stove upon which it sits, that frog will stay in the pot until it becomes soup. My fellow Americans, that frog is us and the parallel reality that is so essential for the transformation of a state from one of benevolent democracy to one of totalitarianism as set forth by Hannah Arendt is in the final stages of being swapped out. The apple pie authoritarianism becomes more entrenched, political discourse has been reduced to nothing more than demagoguery, lies (either outright or more commonly, through omission) clever and highly sophisticated propaganda, race-baiting, fear-mongering and all delivered through a corrupted and complicit corporate media machine and the celebrity shills that it employs as barkers in the carnival of immorality and perversion that is the shell of American now known as the Homeland.

In the runup to the election, millions of little plastic pieces of vile filth (that hew to the established storylines formerly established as an example in one Julius Streicher’s publication Der Sturmer) in the form of a DVD version of a deceitful and meticulously designed and professionally produced (in order to evoke a proper emotional response from certain credulous or otherwise mentally unstable fringe elements) propaganda film Obsession: Radical Islam's War Against the West and sponsored by a well-funded, shadowy front group were mass distributed (28 million) in many of the nation's newspapers and specifically in swing states in advance of the coming election. The obvious intent was to generate fear and hatred and to manufacture consent as well as swing the election to McCain. It worked to perfection as Muslim children were gassed in the nursery of a Dayton, Ohio mosque just after the Obsession DVD was distributed locally. Of course in the land of Orwellian newspeak it wasn't ruled an act of domestic terrorism. For that matter, neither was Kristallnacht in a certain European closing society that eerily parallels what has been going on in the post 9/11 'Homeland' although it is far more subtle for the original prototype was far too ostentatious to endure for very long.

The Republican presidential campaign of John McCain (once again reverting to true form in his opposition to the stimulus) and the shrill, strident kewpie doll Sarah Palin used political rallies to whip up fear and loathing among the worst fringe elements of society, inciting largely angry and easily duped supporters into shouting “terrorist”, “off with his head” and even “kill him” in reference to Obama who has been the victim of a long-running, highly coordinated, well financed campaign to paint him as a Manchurian Candidate, a secret Muslim, a terrorist collaborator and a wolf in sheep’s clothing. This sort of sentiment continues to be encouraged by extremist fifth columnists and will only fester more as the economy deteriorates and scapegoats are manufactured. Multi-millionaire fascist demagogue Rush Limbaugh (a modern day Father Charles Coughlin) has become a defacto spokesman for the GOP and will continue to foment hatred amidst those most susceptible. The more paranoid elements are already being whipped into a frenzy over Obama's second swearing in (the first was botched by Federalist Society stooge Chief Justice John Roberts) in that he didn't place his hand on a bible, and of course the dirty little rumors that Obama was not born in the U.S. continue to be circulated.

Such vitriolic rallies became veritable lynch mobs and have merely gone underground now that the people have spoken. In a time of an unprecedented domestic economic crisis that already has Americans on the edge are extremely dangerous and will inevitably lead to violence – of course this may be the intent as it is consistent with more traditional versions of fascism. In his study The Authoritarians, Bob Altemeyer identified a certain demographic segment of any society that are hard-wired for serving authoritarians, susceptible to demagogy and subservient to perceived authority figures. This particular part of a population is essential to supporting totalitarian figures who rise to power during troubled times and offer simple answers to complex problems, they are essential components of any fascist regime and their near psychotic fervor can be channeled to the point where they are nothing more than automatons or tools to the dangerous leaders of mass movements. Such behavior was on full display at many Sarah Palin rallies and it wouldn’t take much to turn such gatherings into staging grounds for organized pogroms that could then be unleashed when the time is right.

It certainly brings to mind George Orwell’s 1984, but then these are truly the times which Orwell so brilliantly prophesied, Oceania has always been at war and always will be at war, for that is what we are and all that we shall ever be in the land of the shadow government. No fascist system can for long exist without a certain die-hard percentage of the population who can be mobilized as shock troops, don't ask questions and are full of resentment and hatred, only seeking a strong leader on a white horse with simple answers to complex problems and who will point them in the direction of those who can be easily scapegoated. History always repeats but it never repeats exactly. Yesteryear's Juden are todays liberals.
"The preparations for Hate Week were in full swing, and the staffs of all the Ministries were working overtime. Processions, meetings, military parades, lectures, waxworks, displays, film shows, telescreen programmes all had to be organized; stands had to be erected, effigies built, slogans coined, songs written, rumours circulated, photographs faked..”.

-George Orwell
The ramming through of the Wall Street bailout (TARP), the financial equivalent of the USA Patriot Act in that it placed unaccountable power in a Treasury Department that has become an occupied colony of Goldman Sachs despite a huge public outcry is another indication of just how much power has been transferred into the executive branch. The usual rubber-stamping by a corrupt and (very likely threatened and blackmailed) Congress was a foregone conclusion in the land of sham elections and an increasingly tyrannical government. The passage of this monstrosity was allegedly aided by a threat of martial law, this according to Representative Brad Sherman of California. Former President George W. Bush took to the television airwaves to once again sow fear over an economic Armageddon and also what could be perceived as an implied threat of martial law in the language “America could slip into a financial panic and a distressing scenario would unfold.” One could speculate that the “distressing scenario” which Bush mentioned could activate conditions as set forth in NSPD-51 in order to deal with domestic unrest due to bank holidays, food shortages and any sort of uprising as a result of the financial collapse. Main Core would be utilized to produce the lists of those among the millions already deemed to be suspect and prone to ‘subversive’ behavior, the 3rd Infantry Division’s 1st Brigade Combat Team already in place stateside would be required to ‘maintain the necessary order’ (augmented by Blackwater and other private mercenaries of course) and the roundups and internments would begin. It was an eerie déjà vu moment in which America was transported back to 2002 and 2003 with the apocalyptic conjecture of smoking guns as mushroom clouds, phantom weapons of mass destruction, sleeper cells, biological weapon spewing gliders that could transverse the ocean and an evil dictator who was a “new Hitler”.

Some Historical Context

The United States has had a history of influential groups and individuals that have a serious fascist bent. Some of the most powerful bankers and industrialists of the Great Depression era did plot a coup d’etat (The Business Plot) in order to topple the hated Franklin D. Roosevelt, but were thwarted when the man who they attempted to recruit to lead it, former Marine Corps General Smedley D. Butler instead exposed them to Congress. So shocking was this that the media of that era closed ranks to protect the traitors and erase the ugly blight from our sanitized version of history. It was no secret that Italian dictator Benito Mussolini (once featured in a fawning puff piece in Fortune Magazine) and even Nazi leader Adolf Hitler had ardent American admirers and influential supporters who were enthralled with their highly efficient, corporate friendly authoritarian states and their ability to propagandize the masses and crush labor unions.

A trusted servant of robber barons and financial oligarchs named Prescott Bush, a man whose lineage would include two future U.S. Presidents actually engaged in doing business with the Nazis until the Union Banking Corporation was shut down by FDR under the Trading With the Enemy Act. The OSS and later the CIA actively recruited Nazis and assimilated Hitler’s Eastern European intelligence arm, The Gehlen Organization ostensibly to fight communism. Many top Nazi scientists and intelligence operatives including many who were full blown war criminals were allowed entry into the U.S. under Operation Paperclip after the WW II had ended, they were then assimilated into what would become the military industrial complex as rocket scientists, psychiatrists and medical ‘experts’ (whose labs were the Nazi concentration camps where gruesome medical experiments were performed on human prisoners, I note that similar amnesty was given to Japanese war criminals who participated in the infamous Unit 731) whose wartime experience with mind control and torture techniques would be of use to the CIA. Some former Nazis were allowed to migrate to Central and South America where they established expatriate communities and joined forces with U.S. sponsored fascists to crush leftist democratic movements in the most brutal of manner all under the cover of defeating communism. Former Nazis played key roles in the carrying out of the wet work of the American empire in Latin America, notably Argentina and their influence would set the precedent for the unimaginable cruelty and repression that would later be used in Nicaragua, El Salvador and Pinochet's Chile as well as much later in Iraq.

Klaus Barbie aka the Butcher of Lyons was one of the more notable names and is a perfect example of an asset being used to further American interests in the southern cone, Barbie was a key part of the 'Cocaine Coup'. The corrupting influence that was asserted on intelligence, the military and deep state movers and shakers by such a close affiliation with Nazi war criminals and the inevitable damage done in terms of moral authority is as difficult to fathom as it is extremely disturbing but that is a story for another time. So as not to overly dwell on the Nazi connection (the amount of material on it is voluminous) I do want to comment that it shows the depths to which the National Security State will go in order to ensure its own perpetuation and ability to lay down with wolves so that the real power structure in this country is allowed to function with ruthless, Machiavellian precision in the darkness that exists just below the façade of legitimate public and private institutions in the United States.

The Cold War gave the intelligence apparatus and the military industrial complex the cover that was needed in order to build the infrastructure of an extra-Constitutional government. Almost from the very inception of the CIA the United States became involved in the assassinations and overthrow of legitimate democratically supported governments all untertaken for big business and to crush resistance to western capitalism. The obvious Nazi influence manifested itself in the extreme cruelty of the methods used to expand the empire and death squads were sanctioned, torture was widespread to the extent that it was even taught at the far-right School of the Americas and the agency participated in sadistic and immoral mind control experimentation programs such as the notorious MKULTRA. It is of the utmost importance to understand the root of evil that is the Central Intelligence Agency that was put together by the American capitalist elite in the aftermath of World War II to act as a Gestapo for Wall Street and business interests not confined to the spheres of legality. I would like to make reference to a that summarizes this much better than I could ever hope to do in a well documented story How the CIA Created a Ruling, Corporate Overclass in America that is a must read for everyone who really is serious about going at the existing order.

The cover of darkness allows for the breeding of mutations and the CIA itself eventually was able to reconfigure into compartmentalized factions, some of the more militant joined forces with organized crime, extreme right-wing groups, elements of the military and foreign intelligence services to carry out clandestine and black ops domestically. The assassination of President John F. Kennedy for all of the research, investigations and time elapsed has never truly been solved and it is highly likely that a Secret Team (to use the term of L.Fletcher Prouty) may have been involved in the assassination, a moment in our history after which everything changed. Kennedy dared to challange the power structure when he spoke of:
"...a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence--on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations."
Many presume that this was directed at communism, the era was the height of the Cold War but the speech was in the aftermath of the failed Bay of Pigs invasion, a botched overthrow of Fidel Castro for which the more extreme elements of the military, the fascist right, the CIA, organized crime and big business interests that were thrown out of Cuba after the revolution blamed Kennedy for undermining. Kennedy had made very dangerous and mortal enemies and further inflamed matters when he threatened to "splinter the CIA in a thousand pieces and scatter it to the winds" and ousted director Allen Dulles, a man who was a major factor in the post WW II alliance with the Nazis and Operation Paperclip as well as a member of Wall Street law firm Sullivan and Cromwell, a representative of anti New Deal American fascists as well as an alleged broker of business deals with the Nazi regime. Ironically (or maybe not) Allen Dulles would later become a member of the Warren Commission that gave legitimacy to the Lee Harvey Oswald as lone nut conspiracy theory while ignoring the larger picture. I reference the Kennedy assassination not to go into it at any great length but that it, like the later assassinations of Robert Kennedy and the Reverend Martin Luther King Jr were all coordinated actions of the shadow government to remove opponents of the rising American fascist state.

There have throughout the years been millions upon millions of pages written by those who have investigated (and provided cover to the official conspiracy story of) the Kennedy assassination and yet there is still no real answer to what exactly happened but the reason why is the real key. I would like to note that some attention should be paid to the out of print book by Carl Oglesby, The Yankee and Cowboy War which looks into warring factions and examines at length the JFK assassination, the implausibility of Oswald and the story of Jack Ruby who never was able to tell his story cryptically implored Chief Justice Warren that unless he was able to be taken out of Dallas and to Washington to personally speak to President Lyndon B. Johnson that:

"….Consequently, a whole new form of government is going to take over our country, and I know I won’t live to see you another time."

Peter Dale Scott who has himself done an immense amount of research on the JFK assassination puts it like this in his aforementioned essay 9/11, Deep State Violence and the Hope of Internet Politics has this to say about America and the failure to come to terms with the murder of John F. Kennedy:
Recent history has seen a number of such events, such as the assassination of John F. Kennedy, that are so inexplicable by the public notions of American politics that most Americans tend not even to think of them. Instead most accept the official surface explanations for them, even if they suspect these are not true. Or if others say they believe that "Oswald acted alone," they may do so in the same comforting but irrational state of mind that believes God will reward the righteous and punish the wicked.
Kennedy's death paved the way for the military industrial complex (that President Eisenhower ominously warned of in his farewell speech) to escalate the Vietnam War and declare war on the American public who dissented with the immorality of that damned war and took to the streets in protest. Their efforts would shake the very foundations of this nation's corrupted institutions, terrify the ruling elite classes and create a climate where any means necessary to control domestic unrest would be utilized lest the existing order be toppled.

The Reagan Years

As I wrote in part one of this ongoing series, the recent articles Christopher Ketcham entitled The Last Roundup and Tim Shorrock’s Exposing Bush's Historic Abuse of Power are both about the massive database Main Core and how it relates to Continuity of Government programs. It is encouraging to see that there is now more being written about this subject by more well known and influential figures than this humble blogger. Author James Bamford's new book on the NSA entitled The Shadow Factory is drawing a good deal of attention already on just how much that Americans have been spied on by our own government, the rogue neocon occupying faction as well as Israeli elements working alone and in conjunction with domestic interests (but much more on that in part four of this series). Arch-conservative John Whitehead of the Rutherford Institute (instrumental in funding Paula Jones' lawsuit against President Clinton) wrote two articles on the shadow government which shows that the immense danger of this transcends the trivialities of partisan politics. The Whitehead pieces can be found at the Huffington post and are entitled America's Shadow Government: Part One and America's Shadow Government: Part Two. I excerpt a small piece from Mr. Whitehead below:
What is the bottom line here? We are, for all intents and purposes, one terrorist attack away from having a full-fledged authoritarian state emerge from the shadows, at which time democratic government will be dissolved and the country will be ruled by an unelected bureaucracy. And because so much of this shadow government remains under wraps, there is much we don't know about it. Yet that does not diminish the threat it poses to democratic government.

In his 1961 Farewell Address to the Nation, Dwight D. Eisenhower tried to warn us that a nefarious military-industrial complex had emerged in America. "The potential for the disastrous rise of misplaced power exists and will persist," he said. Eisenhower realized that after World War II, America had become a national security state that operated largely in secret and answered to practically no one.
It is heartening to see this most critical of subjects being examined at last for if the relentless drive towards an American fascist government is not at the very minimum slowed, then nothing else is really going to matter is it?

But I digress....

As I previously stated, this particular administration of an ubiquitous, personable, uninquisitive, (and eventually doddering) longtime pitchman for the American brand of hard right fascism was a veritable devil’s playground for those who more than dabbled in concocting dangerous plans in the darkness that could be put into use against all perceived enemies of America, both foreign and domestic, and during which a lot of cash could be made on the side. Reagan was backed by longtime spook, fixer and former CIA chief George Herbert Walker Bush who used the office of the Vice President as a fertile launching ground to lay the groundwork for what his son would so effectively preside over as the “unitary executive” with the necessary muscle provided by Dick Cheney and the neocons who found a friendly incubator for their decidedly radical anti-American ideas during the Reagan administration. Reagan’s White House was a front for cowboys Lt. Oliver Colonel North, Richard Secord, John Poindexter, William Casey and John Negroponte; neocon connivers Elliot Abrams, Michael Ledeen, Paul Wolfowitz, I. Lewis ‘Scooter’ Libby, Richard Perle, Douglas Feith and Continuity Of Government leaders Dick Cheney, Edwin Meese, Donald Rumsfeld and David Addington among others. Most of theveteran shadow government operators went on to become influential players in the Bush-Cheney administration where they have worked to ensure that their plans would reach fruition.

It was during the Reagan administration that Earl Brian, a crony of Ed Meese assisted in the theft and distribution of the enhanced version of INSLAW's PROMIS software and it was put to good use by among others Colonel Oliver North who used it in conjunction with his REX 84 program to track and monitor potential dissidents or opponents who could be rounded up when and if the time was deemed necessary. Similary such operations were already on the books in Operation Cable Splicer and Operation Garden Plot. PROMIS was also distributed and used by foreign intelligence services such as the Mossad according to the Gordon Thomas book Gideon's Spies. Israel has always proved a useful cutout for shadow government black ops such as Iran Contra and the Bamford book looks at the role of Israel in the ongoing illegal spying of the Bush regime. Both Shorrock's and Ketcham's pieces link Main Core to PROMIS which provides the link through C.O.G. to the shadow government itself which was at it's most visible during the Reagan years. North ran the REX 84 program out of FEMA to plan for the mass roundup and detention of American citizens, allegedly targeting about 400,000 'illegal aliens' (brown skinned people always seem to make for good scapegoats and cover for secretive government operations), with Cable Splicer and Garden Plot as prototypes the current administration has launched a similar program called Operation Falcon, a potential test run to fill up those detention facilities that Haliburton subsidiary Kellogg, Brown and Root were awarded a $385 million contract for? If so you can rest assured that Main Core will be able to generate the pickup lists for such an operation. The camps were justified in the aftermath of Hurricane Katrina as being necessary for illegal immigrant roundups, temporary housing facilities for displaced victims of natural disasters and for other unspecified "new programs". Maureen Farrell wrote the definitive piece on this for Buzzflash in 2006 entitled Detention Camp Jitters. I only wish that I was making this stuff up but it is far more advanced than we know.

I reference breaking news by Ellen Brown on the mysterious Wackenhut prison buses that were sighted in the Arizona desert, I will address this in more detail in the next installment.

Conclusion

Our cities have turned into jungles
And corruption is stranglin' the land
The police force is watching the people
And the people just can't understand
We don't know how to mind our own business
'Cause the whole worlds got to be just like us
Now we are fighting a war over there
No matter who's the winner
We can't pay the cost
'Cause there's a monster on the loose
It's got our heads into a noose
And it just sits there watching

-Monster (Steppenwolf)

America post-9/11 has been a period of triumph for the shadow government. The ascendance has now been nearly completed, the transformation for all intents and purposes is likely now irreversible. The surveillance grids have been locked into place, the Constitution altered forever, the opposition cowed and nullified, the media matrix impenetrable, the Congress rendered irrelevant, the public brainwashed and the military on alert to move against the citizenry domestically (when the order is given. As they say in the financial world, the gains have been locked in.

Despite the banishment of Bush-Cheney there will likely be no real restoration of what has been lost nor will there be any serious type of accountability, fascism and militarism are now as American as apple pie. Certainly there will be cosmetic changes, President Obama has already announced Guantanamo Bay will be closed, it’s just become too much of a symbol of all that has gone wrong. Torture has also been denounced by Obama and the CIA black prisons have been ordered to be shut down but with a deeply entrenched renegade shadow government it is likely that the ghost planes will continue their rendition routes to black sites abroad (albeit covertly) and that private surveillance and intelligence outfits will continue to receive government funding and mercenary armies like those of the infamous Blackwater will continue to grow stronger.

While Tim Shorrock in his Salon piece “Exposing Bush’s Historic Abuse of Power” writes of rumors of a potential series of Congressional investigations:
The proposal for a Church Committee-style investigation emerged from talks between civil liberties advocates and aides to Democratic leaders in Congress, according to sources involved. (Pelosi's and Conyers' offices both declined to comment.) Looking forward to 2009, when both Congress and the White House may well be controlled by Democrats, the idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror to undermine the Constitution and U.S. and international laws. The goal would be to implement government reforms aimed at preventing future abuses -- and perhaps to bring accountability for wrongdoing by Bush officials.

"If we know this much about torture, rendition, secret prisons and warrantless wiretapping despite the administration's attempts to stonewall, then imagine what we don't know," says a senior Democratic congressional aide who is familiar with the proposal and has been involved in several high-profile congressional investigations.

"You have to go back to the McCarthy era to find this level of abuse," says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union. "Because the Bush administration has been so opaque, we don't know [the extent of] what laws have been violated."

The parameters for an investigation were outlined in a seven-page memo, written after the former member of the Church Committee met for discussions with the ACLU, the Center for Democracy and Technology, Common Cause and other watchdog groups. Key issues to investigate, those involved say, would include the National Security Agency's domestic surveillance activities; the Central Intelligence Agency's use of extraordinary rendition and torture against terrorist suspects; and the U.S. government's extensive use of military assets -- including satellites, Pentagon intelligence agencies and U2 surveillance planes -- for a vast spying apparatus that could be used against the American people.

Specifically, the ACLU and other groups want to know how the NSA's use of databases and data mining may have meshed with other domestic intelligence activities, such as the U.S. government's extensive use of no-fly lists and the Treasury Department's list of "specially designated global terrorists" to identify potential suspects. As of mid-July, says Steinhardt, the no-fly list includes more than 1 million records corresponding to more than 400,000 names. If those people really represent terrorist threats, he says, "our cities would be ablaze." A deeper investigation into intelligence abuses should focus on how these lists feed on each other, Steinhardt says, as well as the government's "inexorable trend towards treating everyone as a suspect."

"It's not just the 'Terrorist Surveillance Program,'" agrees Gregory T. Nojeim from the Center for Democracy and Technology, referring to the Bush administration's misleading name for the NSA's warrantless wiretapping program. "We need a broad investigation on the way all the moving parts fit together. It seems like we're always looking at little chunks and missing the big picture."

A prime area of inquiry for a sweeping new investigation would be the Bush administration's alleged use of a top-secret database to guide its domestic surveillance. Dating back to the 1980s and known to government insiders as "Main Core," the database reportedly collects and stores -- without warrants or court orders -- the names and detailed data of Americans considered to be threats to national security.

And

Getting a full picture on Bush's intelligence programs, however, will almost certainly require any sweeping new investigation to have a scope that would inoculate it against charges of partisanship. During one recent discussion on Capitol Hill, according to a participant, a senior aide to Speaker Pelosi was asked for Pelosi's views on a proposal to expand the investigation to past administrations, including those of Bill Clinton and George H.W. Bush. "The question was, how far back in time would we have to go to make this credible?" the participant in the meeting recalled.
However given the inability of the Congress to do anything to provide a check on the monstrous abuses of the Bush-Cheney regime (and those shadow government activities that preceded it) it is highly unlikely that any legitimate, official review along the lines of the Church Committee will ever occur. If there is any sort of an investigation I would think that it would be a dog and pony show whitewash along the lines of the Warren Commission or the Kean-Hamilton 9/11 Commission, both of which served to do nothing other than provide the facade of an investigation while protecting those implicated from having their criminality exposed in the interests of national security and to continue to provide cover for the existing established order. In their true feckless manner the Democrats are already deferring to their more openly fascist cohorts in the first days of the new administration which does not bode well for the future.

Too much damage has already been done and too many stand to face not only criminal charges but also charges of outright treason if the sort of sweeping investigation that is required to get into the real systemic rot is undertaken.