Archives for category: Espionage

A short history leading to events in Ukraine

The war between Russia and Georgia in 2008 was long term result of South Ossetia broken off from what became North Ossetia by Stalin (a Georgian) and given to Georgia as a sort of gift. When the USSR broke up, the South Ossetians wanted nothing to do with Georgia, they are historically a part of and strongly identify with Russia. The Ossetians rebelled from the beginning at being a part of post-Soviet Georgia. The Bush selected (& New York lawyer) Mikheil Saakashvili was installed by a CIA supported ‘color revolution’ in Georgia and that is when the real trouble began. It was (then) President Medvedev ordered the Russian military to ‘invasive’ counter-attack while (then) Prime Minister Putin was sitting with Bush at the Olympics in Beijing, after the USA trained Georgian military crossed the border (following skirmish with militia) en mass and unleashed rocket barrage on the South Ossetian city of Tskhinvali. Message to the West & NATO from Russia? Leave the border regions alone.

Similarly, Crimea had been integrated to Russia for 200 years, to 1954, when Khrushchev (married to a Ukrainian) presented Crimea to Ukraine as a birthday gift of sorts (the practical reason underlying this was to put the construction of a canal under a single administration, a logistics issue.) More recently, Putin had been telling the western leaders for at least six years to stay out of Ukraine but wasn’t listened to. Meanwhile Russia had been promised at the breakup of the USSR that NATO would not expand to the east, a promise repeatedly broken. The reaction of Russia (with the neo-nazi Svoboda party having five ministries in the new regime at Kiev) in Ukraine is the result. If Russia takes the east of Ukraine to the Dnieper River (with its majority ethnic Russian population), the West only has itself to blame. Putin, with the backing of a very large majority of Russians, is not going to put up with NATO on Russia’s doorstep. Relevant to this, following internationally monitored elections deemed free and fair, Ukraine had dropped its association with NATO in 2010 and Russia will not be allowing NATO to return to its’ border, end of story.

This is the second time around for the West pushing its way into Russia’s face in Ukraine. The Russians put up with it with the color revolution bringing Viktor Yushchenko to power, but the neo-nazi Svoboda regime installed this second time around, was too much (the new regime is also populated with a liberal handful of corrupt oligarch Yulia Tymoshenko cronies.)

For related information on this aspect of geo-politic of isolating and cornering Russia, one need only do a short online research of the topics ‘The Grand Chessboard‘ by Zbigniew Brzezinski:

“Regarding the landmass of Eurasia as the center of global power, Brzezinski sets out to formulate a Eurasian geostrategy for the United States. In particular, he writes, it is imperative that no Eurasian challenger should emerge capable of dominating Eurasia and thus also of challenging America’s global pre-eminence”

And the ‘New Great Game:

“The New Great Game is a conceptualization of modern geopolitics in Middle East as a competition between the United States, the United Kingdom and other NATO countries against Russia for “influence, power, hegemony and profits in Central Asia and the Transcaucasus””

For a good read on the related ‘color revolutions’ one need only study: ‘Terror and Civil Society‘ by rogue CIA officer Phillip Agee, exposing method-

Ukraine for Dummies

Deep State IV (related)

 

*

Spy

Reporting from undisclosed location

This law brief to The European Court of Human Rights is, as I have instructed, to be filed in the case of my bodily seizure for purpose of forced deportation, other arrest or if I simply have ‘vanished’

A synopsis of the legal rationale of this law brief is: when the USA joined the International Covenant on Civil and Political Rights (among other multi-lateral Human Rights treaties with force of international law) but held out these treaties would be “non-self-executing”, the USA essentially claimed its own constitutional principles would enforce the several treaties’ provisions. This places the USA in a unique circumstance of substituting its own provisions of law for the provisions enumerated in the International Covenant and other instruments of international law. In this case, it is argued the Obama administration’s demonstrable violation of foundational American principles of law are subject to interpretation in diverse jurisdiction under international Human Rights law, in a nation any American citizen should apply for asylum in.

Restated, an American seeking asylum can put the USA’s record, in relation to its own civil liberties provisions, on trial in any suit they might bring in jurisdiction where Human Rights treaty law may be enforced and subsequently the European Court of Human Rights.

In the case of the USA signatory to the International Covenant on Civil and Political Rights, example given, and the several other Human Rights treaties in relation to American basic or foundational law, The American constitution’s Article Six is straightforward on its face: “any treaty made shall be the supreme law of the land.”

But it is, of course, not this simple. Any treaty in question which been ratified by the Americans in large part as “non-self-executing”, constitutes a legal fiction indicating American law already covers the most fundamental rights promised by the treaties. In other words, the USA claim in relation to the treaties is one of ‘our laws are already in compliance and we have all of the treaties’ demands covered.’ And so it is, in any USA court, although a judge may consider the treaty in her/his ‘finding of facts and conclusions of law’, the laws applied will in fact be American laws and interpretations in relation to any question of rights promised by the International Covenant and other Human Rights specific law.

This preceding would place an American’s rights squarely in law of the USA, were one to be tried in any American court, in actuality the rights promised in the treaty itself are already become in a sense moot in relation any American prosecution, where there is no political will to enforce the treaty’s provisions, demonstrated in any decision to prosecute to begin with.

In the USA, federal judges are political appointments, pure and simple. The executive provides lists of desired appointments to fill court positions to the senate for confirmation and that is it. That the senate often fights among themselves over the appointments, that the appointments are often long delayed, cannot conceal the fact every sitting United States federal judge is the result of raw politics. That merit does not presently play in this process is amply demonstrated by the fact Bush administration torture lawyer Jay Bybee became a sitting federal appellate judge and there is no movement whatsoever to impeach and remove Bybee from the bench, since it had become public knowledge Bybee authored memos justifying torture.

That American judges are not bound to the rights promised in the International Covenant and other Human Rights treaty law is ably demonstrated by the fact a sitting supreme court justice had, as a federal judge, let an innocent man rot eight additional years in prison on a rules technicality, when exculpatory evidence showing the man’s innocence had been produced for the court, prior to the justice’s appointment by  Obama and confirmation to the Supreme Court of the United States.

In the United States theory of law there is a known and in the past applied concept called ‘color of law.’ Color of law is when the apparatus of state puts up a pretense of legitimate authority to pursue what are in fact illegal acts.

In the case of the FISA court authorizing PRISM and one must presume XkeyScore revealed by Snowden, there is ZERO constitutional foundation for any secret jurisprudence violating citizens’ rights laid out in the first through eighth amendments or American Bill of Rights, which the FISA court in fact sets out to do. When the constitutional language authorizing congress to create courts is construed in a way to cancel out other clauses of the constitution, there cannot be legitimacy where a constitutional oxymoron has been created. It is precisely the American Bill of Rights the USA holds is binding it to conformity to the International Covenant.

Any actual criminal acts defined as treason in the American sense in the authentic American ‘de jure’ rule of law are those persons putting forth a pretense the secret court authorizing civil liberties violations are legitimate. This points first to the Congress authoring patently unconstitutional legislation, then second, to any president signing and implementing such unlawful authority and subsequently, any Chief Justice appointing members of said secret court, and finally those persons accepting and serving FISA, these are the ‘traitors’ if the USA constitution were to mean anything in the present day, when in fact it would appear it does not.

American present political structures disregard for the American foundational law is perhaps best demonstrated by Congress granting immunity to the telecoms, when the telecoms had played ball with criminals in the Bush administration (we now know likely had been authorized by the FISA court, on account of Snowden’s revelations), participating in what amounted to warrant-less searches and eves-dropping without a warrant, stealing and handing over peoples personal information in criminal acts Americans had been historically protected from by the USA constitution and pertinent laws, the 4th Amendment of the USA Bill of Rights particularly.

These violations should have opened the telecom corporations to both criminal penalties and civil liabilities. There were crimes committed which should have been prosecuted and people have a right to sue. The potential liability looked pretty big and the telecoms lobbied for immunity. The following constitutional violations were enacted by Congress:

1) ex post facto. The USA constitution specifically prohibits Congress making any “ex post facto” law, as typically or historically applied that means a behavior cannot be criminalized after the fact and applied retroactively, or more broadly, new laws cannot be made governing an event that is in the past. In this 2nd case we have a valid constitutional claim prohibiting making a law excusing past criminal civil liberties violations against our citizens, violations which had created liabilities. What is required for the criminal aspect solely, is a PARDON

2) legislative pardon: Congress cannot give pardons to the individuals within the telecoms who’d signed off on and perpetrated the crimes, that is reserved by the USA constitution to the president and neither can the congress or the president pardon corporations in any manner excusing civil liability, the corporations must be held accountable and seek any leniency based on possible mitigation factors from the courts, because [3 & 4 combine to make a constitutional principle]

3) the” right to petition for redress” is promised to every citizen who has been wronged and

4) “suit at equity”, that is, the courts existing to do what is right by the citizen, is the avenue provided by the USA’s constitution to fulfill the promise of every wronged citizen’s ‘right to petition for redress’ or it should be said there is no right of corporate or government impunity. Citizen’s petitions for remedies and compensation may not be preemptively denied fair hearing, in the USA’s courts of law by the Congress.

The oath to uphold the USA’s constitution had been meant to prevent such patently wrong laws in the first instance. When this oath is become patently meaningless, as in the case of the majority of congress, points squarely to the core of corrupt process usurping the USA foundational law.

Obama’s proposal to create a court to oversee the USA’s drone strikes are an admission the targeted killings of Anwar al-Awaliki and his son, both American citizens, were extra-judicial assassinations:

Read the facts laid out at the Guardian HERE

Obama’s task force proposing to amend the FISA law to create an advocate for the American public in presentations before the secret court, which to now has only heard the executive side arguments, are an admission there is no compulsory (constitutionally required) due process for citizens in the secret venue:

Reuters article on the task force recommendations HERE

Both of these proposals underscore overwhelming fact the USA institutions of governance have become removed practically altogether from its foundational rule of law. The very fact nearly the entirety of any ‘legal rationales’ related to the preceding phenomena are classified ‘state secrets’ reinforces the argument of a regime denying the people and the peoples advocates any avenue to right the ship of state per the constitutional order:

Legal Times on ‘state secrets’ HERE

REPEATEDLY, the Obama administration’s Department of Justice has denied discovery in evidence in suits brought by victims of both; torture and warrant-less surveillance, citing “national security” and “state secrets” arguments, which have been too often routinely rubber stamped by American federal courts, denying the fundamental “Right to petition for redress” per the American foundational law. This, despite a past Supreme Court decision finding federal common law prohibits executive privilege denying the right to petition for redress in the case of Bivens v. Six Unknown Named Agents, 403 U.S. 388 (1971) in illegal invasion of a private home, pointing to the present regime of American law patently ignoring its own principles:

Federation of American Scientists compendium on ‘state secrets’ HERE

Obama’s Department of Justice has assiduously protected the Bush criminal regime by refusing to bring warranted prosecutions. Directly relevant to this, because of Snowden’s revelations, we now know both the Bush and Obama administrations had engaged in egregious crimes against the American constitutional order, all with the approval of the secret FISA court:

Facts laid out at the Guardian HERE

Furthermore, present CIA Director Brennan has helped construct and justify the Obama Administration’s claim that it can kill people, including American citizens, abroad on its own authority, even when those people are not in countries with which the USA is at war:

Brennan ‘kill list’ facts at the New Yorker HERE

Insofar as the secrecy of this list, we cannot know which Americans has been added or what names have been taken off:

Brennan’s phony ‘kill list’ reforms at The Atlantic HERE

If the USA were to claim the petitioner, Ronald Thomas West, is not on any such kill list, there is ample evidence the present American executive routinely lies in such matters:

Facts of relevant lies laid out at The Guardian HERE

How the preceding arguments can be tied to the American obligations to the International Covenant and other international Human Rights law is quite simple; “no nation may go against its own acts” is an international common law principle as old as Rome, and when the USA asserts its own constitutional principles are the glue that binds its obligation to uphold the International Covenant and other obligatory international Human Rights treaty law with its ‘non-self-executing’ ratifying rationale, the USA cannot undermine its own constitutional principles in regards to individual rights and be construed to be in good standing with the multi-lateral Human Rights treaties.

It is not only going against the act of its own foundational law, the USA is doing these violations having bound its foundational law to the International Covenant and is therefore going against the treaty it has committed itself to, when by act of non-self-executing rationale, it entered American individual rights per se into force of international law, subject to adjudication under the general principles of international Human Rights law in diverse jurisdiction.

Furthermore, were Ronald Thomas West not to have been on the White House ‘kill list’ (which cannot be proven but certainly inferred), there is ample evidence to make a case rogue elements in the American security apparatus endanger his life:

According to a Washington Post investigative report in 2011, “some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States. An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances” :

Washington Post investigative report HERE

This is bolstered by a bloomberg.com article: “Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency” :

Bloomberg exposes the facts HERE

Additionally, the US Congressional watchdog GAO [Government Accounting Office] reports as a result of faulty data, US intelligence agencies: “are not well-positioned to assess the potential effects of relying on contractor personnel” :

Read the Government Accounting Office findings HERE

And then, a US Army Intelligence Officer stated to Buzzfeed: “I think if we had the chance, we would end it very quickly.” [USA intelligence would like to find Snowden] “Just casually walking on the streets of Moscow, coming back from buying his groceries. Going back to his flat and he is casually poked by a passerby. He thinks nothing of it at the time starts to feel a little woozy and thinks it’s a parasite from the local water. He goes home very innocently and next thing you know he dies in the shower” :

Read the murderous intent of the NSA apologists HERE

In fact most of the unlisted events in the associated chronology detailing the experiences of Ronald Thomas West had to do with evading stalkers whose behaviors profiled for action as described in the paragraph preceding.

This points to the utter corruption of American intelligence, where a corrupt Pentagon, that has thrown the rule of law under the bus, and associated corrupt corporate personalities (e.g. Christian extremists Condoleezza Rice and former NATO Supreme Commander & Obama National Security Adviser General James Jones, in association with CHEVRON) can access top secret material via the Pentagon’s NSA (National Security Agency) for essentially any purpose they please, up to and inclusive of assassination.

It is the position of Ronald Thomas West he should not have been forced into application for political asylum but that Germany should have issued warrants for arrest and pursued prosecutions of the several criminals engaged in attempted assassination of the same.

Germany shirking its responsibility to uphold the rule of law has resulted in a grant of impunity to criminal elements in the Western democracies intelligence/security services, up to and including attempted assassination for purpose of concealing crimes, when in fact if warrants for arrest were issued and extradition demanded, the USA and associated corrupt personalities would be confronted with a choice; upholding the rule of law or dropping its sheepskin concealing corrupt, criminal cabal at the apex of its security services.

Ronald Thomas West therefore requests that (LOCATION COUNTRY REDACTED) be prohibited from expelling his person and Germany be directed to refer all relevant evidence to the proper legal body for prosecution of the crime of attempted assassination and cover-up of the same.

S1

“It’s been a wild ride” -Ronald Thomas West

22 April 2015 update: A Polish MEP [Member of European Parliament] states in  an interview the Maidan snipers were trained in Poland as a favor to the USA intelligence services.

Question: “[you are] a supporter of the thesis it was a CIA operation?”

Answer: “Maidan was also our operation. The snipers were trained in Poland”

The original interview transcript in Polish language HERE

A reasonable English language summary of the interview by PRAVDA:

A leaked phone call between the European Union’s Cathrine Ashton and the Estonian foreign minister, indicates it was a member (or members) of the new USA supported Ukrainian administration were behind the snipers who killed both protestors and police during confrontation in Kiev. (conversation begins about 2 minutes into this youtube posting)

John Kerry had claimed it was the ousted administration behind the snipers. A better explanation (backing up the leaked conversation) is found in rogue CIA officer Phillip Agee’s expose: ‘Terrorism and Civil Society

Ukraine for Dummies

*

Čitajte na srpskom

A story of how defending Native American sacred lands had morphed, over a period of 20+ years, into a game of international intrigue & surviving assassination; with conclusions

Chronology of Events in the Case of Ronald Thomas West
(abridged summary)

1

In 1987 I was asked by Floyd Heavyrunner, traditional war chief of the Blackfoot Indians of Montana, to monitor interest by United States Department of Agriculture (Forest Service) in development of oil and natural gas in the Blackfeet tribe’s treaty lands known as the ‘Badger-Two-Medicine’ also known as the ‘Ceded Strip’, subject to tribal rights under the so-called ‘Grinnell Agreement’ also known as the ‘Treaty of 1895.’

In 1988, Floyd retained Mark Mueller of Austin, Texas (licensed in Montana) as attorney of record for the Blackfoot ‘Brave Dogs Society’ also known as the ‘Crazy Dogs’, in Floyd’s capacity as traditional cultural leader of that ancient tribal organization.

By 1991, as lead investigator on behalf of the Brave Dogs Society, in association with Mark Mueller, I had developed copious documentary evidence of a criminal ring working inside the United States Department of Agriculture, on behalf of CHEVRON Corporation, detailing a concerted effort to counterfeit compliance to laws that otherwise should have protected the area on behalf of the Brave Dogs Society, to include officials of the United States pursuing the following illegal acts, including felonies:

Lying to the Brave Dogs and counsel

Lying to the public

Lying to Congress about following specific applicable laws (National Historic Preservation Act ‘traditional cultural properties)

Concealing Forest Service knowledge of those applicable laws from the Brave Dogs, counsel and the public

Concealing Forest Service officials training in those same applicable laws

Deliberately cheating those same laws, to the benefit of CHEVRON

These incriminating documents, taken together, indicate a pervasive and organized criminal network represented in government officials, working on behalf of CHEVRON for the purpose of deliberately counterfeiting compliance to law, going to the highest levels of the United States at Washington DC. This particular criminal event was organized and run out of the Northern Region One Headquarters of the United States Forest Service at Missoula, Montana, and implemented via the Great Falls, Montana, offices of the Lewis and Clark National Forest.

These documents were incorporated into administrative appeal when the CHEVRON (and FINA) permits to drill were approved in what amounted to a ‘rubber stamp’ process at the Northern Region One Headquarters at Missoula. This appeal stopped the project in its tracks. The quandary of coving up the criminal network was accomplished by bureaucratic fiat, when the FBI declined to become involved (I personally briefed an agent who reviewed the documentation and acknowledged their substance but claimed he had no authorization to act and referred to the United States Attorney (United States Department of Justice) office at Billings, Montana, whom he stated were very well aware of the issues), after the United States Department of Agriculture Inspector General declined to investigate, the USDA Inspector General’s office saying they would not become involved on the pretext of the issue had already been raised in the administrative appeals process. Because the government (and Chevron) did not dare to allow the documents into the federal court record, where they would be put in front of a judge (or judges, on appeals in court litigation), a political deal involving lease swaps was engineered by United States Senator Max Baucus with CHEVRON and CHEVRON backed out. When I personally managed to place the incriminating documents into the hands of (recently new) Forest Service Chief Floyd Thomas, he attempted to close down the Northern Region One Headquarters and move those operations to Denver, where they ‘would fall under closer supervision.’ It took the efforts of two United States Senators, Max Baucus and Conrad Burns, to reverse this.

Note 1) REDACTED

Note 2) Two attorneys briefing the government side (Forest Service) on Native legal issues during this period, John Yoo & Jay Bybee, would later become infamous as Bush ‘torture lawyers’ in association with Condoleezza Rice. Condoleezza Rice, in turn, has had (previous and post Bush regime) close association with CHEVRON.

Note 3) the Montana ‘Northern Region One’ headquarters has a  long association with CIA, dating to the 1950s and still an active relationship into the 1970s and probably through 1980s and beyond, relating to  air services, surplus property, and laundering aircraft used in agency gun running & rogue elements (black budget) international narcotics trafficking.

Note 4) Immediately following my investigative result in 1991, revealing the criminal ring inside government working for CHEVRON, the Veterans Administration suddenly, spuriously, diagnosed me as suffering “Psychosis.” I managed to undo this by independently having myself evaluated by the same medical center used by the VA to to study schizophrenia and came up clean.

Note 5) Following this, my VA records were reviewed by a ‘specialist’ from Washington, DC, and certain documents vanished, making it appear as though I had defrauded the VA. A hearing was scheduled, where I produced a copy of a missing critical document, necessary to my defense, and the hearing was cancelled on the spot and charges dismissed.

Note 6) In 1998 I resigned from employ with Mueller Law office on account of health issues.

2

In 2001, I relocated, from West Glacier, Montana, to Sandia Park, New Mexico. After, I had enrolled my youngest son in the East Mountain High School (a charter school), an accelerated learning institution, in the late Summer of 2005. This school happened to have significant ties to powerful personalities in the Albuquerque corporate military-industrial complex.

By late Fall, intense pressure had been initiated, in form of undue harassment, it would appear intended to make us quit the school.

I initiated a ‘pro se’ investigation, to uncover the core reason(s.) In the process of this, what had been uncovered by myself were:

Felonies tied to the school’s pattern and pervasive civil rights violations of minority students particularly, and other students, by undue influence of ultra right-wing, racist, ‘Christian Dominion’ personalities.

What appears on its face to be an American charter school (EMHS) with embedded intelligence agents employed as instructors.

The possible use of school sponsored ‘field trips abroad’ as cover for covert operations in Latin America and Europe.

Meanwhile I had caused a parallel investigation (late 2006 into Spring 2007) into the school’s illegal activities, by a member of the school’s governing council, Jim Healy, in regards to harassment of my son and myself. In the course of this second (parallel) investigation by governing council member Jim Healy, I was approached by another governing council member, David Walter, who informed me I was stepping on toes of members of “The Council on Foreign Relations” and warned me (a threat) “Do not dare involve attorneys.” Walter further stated any action to hold the school accountable “Had no chance” under any circumstance. In less than a year, a teacher (intelligence embed, almost certainly CIA) from the school, Vince Langan, was part of a team that attempted to ambush myself in Berlin.

With the East Mountain High School case unresolved, recently divorced, my home sold and my youngest off to college, I had left the USA, in July 2007, to attend a conference at Johannes Guttenberg University, at Mainz, Germany. I had no intention of returning to the USA in short term, realizing I’d made powerful, corrupt enemies, without adequate resources necessary to pursue closure of the charter school case. However in the meanwhile I’d indicated to persons associated with the school’s administration I had no intention of letting the case go. This produced following result:

On 3 October, 2007, I routinely scouted the geld automat (ATM or automatic teller machine) I typically used at the Johannes Thaler Chaucee mall, in the Berlin suburb of Britz. In the course of my (professional security training) assessment of whether there were any threat, I managed to trigger to action a team waiting in ambush at the ATM location. Because I was on to them before they realized they’d been compromised, I was further able to get a point blank visual identity of Vince Langan of East Mountain High School, one of the triggermen, in circumstance that both, allowed myself to escape and caused Langan to realized he’d been identified. Two weeks later, I had a second close encounter with attempted assassination, with persons unknown, on the number 7 underground.

I immediately (following morning) left Berlin for Lindau (Bodensee.)

Note 7) Tracking myself to an ATM location abroad required access to my banking information, which can be had with a so-called ‘National Security Letter.’ This points to corrupted FBI involvement.

3

Having left Berlin for Lindau in mid-October, I shortly arranged via third party (REDACTED) an invitation for German authorities to monitor my situation (“follow me and watch”) This was a deliberate ploy to trap what I believed (at that time) was attempted murder to silence a whistle-blower (myself) in relation to felonies committed by wealthy, corrupt personalities associated with East Mountain High School.

Two weeks later, when I was walking one early Sunday morning, 4 November, 2007, when few people were out and about, a silenced bullet fired by a rifle at long distance, narrowly missed and punched a hole in a parked car I was walking past.

Subsequently, on a Tuesday, 4 December, 2007, I understood I had picked up the German surveillance I had requested, when traveling to give a presentation to a class at (REDACTED), and German police swept the train I had taken, searching one passenger in my car, and asking for identity cards of everyone and interrogating everyone except myself.

Note 8) The high velocity projectile had hit the parked car I was walking past, with such force, it was clear from the sound, the projectile had punched through the metal of the vehicle body, ricocheted off of a retaining wall the car was in front of, and spun to a stop beneath the car. I returned to the location after some days, assessed the possibilities and it became clear the shot had been fired from long distance, from a natural rise (hillside) with good cover, at a distance of perhaps 500 meters.

4

I had moved to Limburg in the early Spring of 2008 and then to Wiesbaden (June), accepting the invitation of the University at Mainz, to teach a course (in English) on American Constitutional law (Summer semester.) This Summer of 2008 was an intense game of cat and mouse for myself, in relation to my would be assassins/stalkers. Of my several Wiesbaden encounters, the most notable events are:

My Motorola (Razer) cellphone with its’ t-mobile USA chip suddenly quit behaving normally, it no longer showed the ’t-mobile D’ (Germany) reception logo, no longer required international code to access my voice-mail in the USA, and in fact the screen appeared (and phone behaved) as though I actually were in the USA. It had been somehow patched around or through the German reception network and appears to have been used by American intelligence (NSA) to GPS my location in real time. I converted my phone to a German t-mobile pre-paid chip.

About the time I’d noticed this phone modification had happened, a glass pellet had been shot at myself while walking a crowded sidewalk on the North side (my area of residence) in Wiesbaden. I heard what sounded like a powerful spring mechanism release behind me, and turned to look, to see a man keenly observing myself as he walked out of the crowd (brown Stetson style hard felt hat, caring an attache case) and into the street, to cross the street and get away. He kept looking at me as though expecting something to happen. When I had returned to my apartment, sat at my desk and removed my knit hat, a very small glass pellet, appearing to be filled with an opaque liquid, had fallen out of my hat, onto my computer keyboard. This pellet had been captured intact by my knit hat, where it was rolled up at the back of my head. I carefully collected (without touching) the glass pellet into a small prescription medicine bottle with my name on it, and packed it with tissue paper as a safety precaution and sent it to analysis via (REDACTED)

Following this preceding incident, I noticed it appeared as though I were being scouted for purpose of establishing my routine habits (the GPS component apparently having been lost due to my phone conversion.)

One person etched into my memory, although I did not know who she was in the Summer of 2008, was then active CIA officer Sabrina De Sousa. She jumped out on account of her smirking at myself when passing on the street. She was clad partially in the casual clothing of South Asia, and gave me a knowing smile and expression that can only be considered remarkable, when encountered in a total stranger. This marked De Sousa in my memory.

Of the several attempts during this period, one attempt clearly resembled the technique employed in the ‘Imam rapito affair’, also known as the Abu Omar case, in which De Sousa was involved. I was returning from teaching class at Mainz, when I noticed an aberration (due to my training) in what otherwise would seem a normal and unremarkable event. A group of men dressed in the typical blue German workingman clothing, taking a break.

The circumstance jumped out at me as I approached for the following reasons; there was no conversation at all, they looked ‘posed’ (stiff, as if unfamiliar with acting), had American body language and what I would call ‘Delta Force’ physiques (the sort of body build you will typically encounter in hyper-physically trained special operations soldiers.) Other than clothing, they did not resemble German laborers at all. My route on the sidewalk would have taken me between what amounted to a close, half-circle of three of these ‘workers’, and the half-circle closed to the street by the open, sliding side door, to a white, windowless van with at least one occupant.

There was a fourth ‘worker’ sitting in the passenger seat (with door open) of a car pulled up closely behind the van, concealing the van’s identity plate from behind. He appeared to be a ‘backstop’ positioned in case I’d evaded or somehow came through the initial three poised to shove myself into the van. Clearly, it was expected I would walk between the half-circle and the van. I approached as if unconcerned, to get as close as possible for visual assessment and at the last moment, instead of continuing on the sidewalk into what certainly was a ‘snatch’ and ‘rendition’ trap (I could have been popped into the van and subdued in a matter of a few seconds, less than five seconds, certainly), I walked out into street and into possible oncoming traffic (and was lucky not to be run down by a car.) Evasion was simple.

The last attempt at Wiesbaden, was when the apartment I had been renting was to be advertised for new tenants. There was an immediate response from a couple living on the United States military base there. This German couple could not take the apartment over from me too soon, they were anxious to move in as soon as possible. He was from the former GDR, was a huge George Bush fan and worked for the American military in some undisclosed capacity (evasive), and she ran a florist business on base.

She shortly called me and stated she would like to bring some packages to leave at the apartment, the evening before I vacated (on a Friday), which raised an additional red flag. I simply said to call me on the preceding Tuesday and ask then, as I could not yet know if I would be home on the evening she wished to come over with the packages. I knew (and did not say) the landlord wished to make some renovations. I left the week preceding my vacancy date, and by the time she called, the apartment had been thoroughly gone through by the landlord and I been out of Wiesbaden for a week. When she asked if the packages could be brought over on Thursday, I replied “I am in Berlin, you will have to ask the landlord.” Her reaction was to shout “He’s in Berlin!” to her husband (co-conspirator) and then her husband launched into a tirade in German… with the German authorities having an open invitation to monitor all of my phone calls, I expect they discovered two Germans working for American intelligence.

Note 9) Without going into detail, I had set up a test during this period, following shutting down the GPS of my phone, by confiding to a close confidant via Skype, technique I expected might work to take me down and succeed in assassination of myself. This was the next technique tried but I was ready for it, saw the circumstance developing and foiled the attempt.

Note 10) I will mention here, I had nearly one full year on the job training (1974-1975) in military special operations intelligence (19th Special Forces Group) with some of the most experienced of that era, and furthermore, I am highly trained in asymmetrical counter-intelligence, concerning technique I am not at liberty to discuss. However oblique reference may be made to this second instance, with referring the reader to this study: ‘Unconventional Human Intelligence Support’ by Commander L. R. Bremseth, United States Navy, 28 April 2001, Marine Corps War College.

Note 11) REDACTED

Note 12) I lost specific timeline notations from this period and going forward, due to a future failure of my laptop and resultant data loss. After the data loss event, I did not resume the habit of keeping notes on much of my experiences but am able to reconstruct some important events timeline with other records.

Note 13) By late 2008, I had realized this was no simple attempted murder case to cover up a school’s corruption, but was something by far bigger. My resolve was to take it as far as I could, in the hope of my being surveilled by German police to now, particularly, would lead to breaking the larger picture of clandestine effort in attempted assassination of myself, into the light of day. At this point I did not actually expect to survive, but was determined to do as much damage as possible to the criminal element, through exposure via the clandestine arrangement of monitoring of myself.

5

After several weeks stay in Berlin, in December 2008 I relocated to Catalonia, Spain, renting an apartment in the town of San Feliu de Guixols.

My stay in Spain was intense, but I will limit my notations to a few extraordinary events.

The Spanish domestic intelligence communicated with me directly, to let me know they had picked up monitoring my circumstance. How this was communicated (including direct ‘thank you’, among other events, on several occasions) is perhaps best described using this early example: I had a remarkable encounter with a woman in a grocery store adjacent to my apartment. It was like a Woody Allen scene in a movie. Only a few days later, this precise scene was caused to be reenacted with myself by another woman who had accosted me in different store. Clearly, she had studied security video of the earlier encounter and this second encounter closely mimicked the first encounter, to let me know I was monitored.

It was while I was in Spain in 2009, CIA officer Sabrina De Sousa sued the USA for diplomatic immunity over her role in the ‘Imam rapito affair’ or the ‘Abu Omar case’, this broke into the news with her photo in online media (New York Times) and I immediately recognized De Sousa as the smirking woman I’d encountered in Wiesbaden the previous Summer. While monitoring the AP Wire (RSS feed) I also picked up a statement attributed to Italian defendant, General Nicolò Pollari, to the effect ‘Condoleezza Rice had been personally overseeing the renditions team in this case.’ He wished to subpoena Rice in his defense.

This is when the larger picture of my own circumstance first began to make real sense. If Condoleezza Rice had been ‘personally overseeing’ a renditions team that included Sabrina De Sousa, this indicated my case was not only about East Mountain High School but had ties going back to the Badger-Two Medicine case of the Blackfeet Brave Dogs Society, CHEVRON, and the Bush Sr administration. Rice’s career path has been from CHEVRON board director to Bush Jr National Security Adviser to Secretary of State (The United States Department of State is Siamese twin to the CIA) and back to CHEVRON, post Bush era. Coincidental to this, two attorneys preparing legal memos on Native American rights cited by the Forest Service in the Badger-Two Medicine case, John Yoo and Jay Bybee, had since become infamous as renditions related Bush ‘torture lawyers.’

In June of 2009, related to these new developments, I had made a brief trip to Berlin to secure the defunct NGO ‘Association for the Support of the North American Indians’ file on the Blackfeet Brave Dogs, which I knew would include incriminating, related documentation. I personally went through the file to ascertain there was a complete record of documentation on the CHEVRON criminal ring previously encountered in the Bush Sr administration (it was all there) and arranged the entire file to be sent on to (REDACTED), which was done.

Date unknown (data loss) a second silenced bullet narrowly missed, fired from a high rise in S’garo, as I walked from the suburb of S’garo, across the rise into San Feliu de Guixols. This event occurred as I passed a construction site where a stone strewn bank caused the the missed high velocity projectile to ricochet. The pedestrian in front of myself jerked his head in the direction of the bullet striking the stone, it could not be ignored.

24 October 2009, I avoided being deliberately run over by a new, red, rental car, by two dark complected males whose arms were covered in gang tattoos.

20 Feb 2010, I surprised former CIA ‘Cowboy’ Gary Berntsen (now in private contracting) at the Hotel Barcarola reception desk in S’garo, it was between 7 & 8AM, as he was checking his hit team into the hotel. We were caught on security camera together.

Gary’s initially had a stunned blank look, which became an expression as though he’d been busted with his hand in the cookie jar and wished he could crawl under a rock as I stood inches from him, literally rubbing elbows, his bodyguard just stood there staring at me with a stunned, stupid look in circumstance that completely blew their cover, I couldn’t help myself, I had to laugh at them on my way out the door. I gave them about six hours head start before posting the fact of that morning’s encounter online, where Spanish domestic intelligence looked for updates on my encounters. Berntsen & Associates were smart to flee.

On the 5th of July 2010 I spent about half an hour visiting with two very polite regional policemen [Mossos] at my door. What the policemen said, was interesting. The police copied my passport information, questioned me about details that would confirm my identity, reported in with their radio my name, my information and had me sign a statement to the effect I had lived in my present apartment “for more or less one year, to be provided to the judge” who wanted to confirm the identity of the person lived in my apartment. I made no secret of the fact I was unregistered in Spain, and I made it clear I had no intention of registering with immigration or applying for residency. The police assured me my staying in Spain was not a problem and they had no interest in anything other than confirming my identity for the judge.

It was about this time I am fairly certain I had been poisoned. I had one day, after eating out, suddenly suffered a copious sweat without fever and after, my health took a downward spiral. That and the fact Judge Baltasar Garzon had been recently been removed from the bench in Spain under immense pressure from the USA in a corrupt and politicized process (I had followed Judge Garzon’s case closely), together with the Popular Party taking power, I felt made my stay in Spain untenable. I returned to Berlin in August.

Note 14) Summer period of 2009 had since vanished from all my online email records, beginning shortly after I had this published this following letter of 18 February 2009 online, posted on 3 June 2009. Most of June, all of July and August went missing, and much more to early 2010, 4 accounts, 3 google and 1 yahoo. This coupled with my previously having been tracked via my Wells Fargo Debit Card (ATM use) and by T-Mobile USA cell employing GPS .. all point to accessing my various accounts, inclusive of phone, banking, and email accounts, via National Security Letter and law enforcement complicit in tracking me for purpose of attempted assassination in exile. The letter I had made public on 3 June:

18 February 2009
From: Ronald West
To: Federal Bureau of Investigation
Greetings FBI
I am asking a copy of this mail be placed in my file, also that a true and complete copy be forwarded to Glen Fine at the Office of the Inspector General for the United States Department of Justice-
Based on my experiences of the past 3-1/2 or so years, I request the following:

An investigation into/and comprehensive review of any related investigations which granted any agency of the United States, to include your own, access (via National Security Letter or ANY means, e.g. Executive Order or legal memorandum bypassing the ‘FISA’ court, etcetera) to my personal information (particularly to my whereabouts via ATM banking records and (GPS) cell phone, email and conversations on ‘skype’) which may have led to my several experience including but not means limited to:

In Berlin, Germany of being stalked at Johannesthalerchaucee Mall (area of Britz Sud) in very close and tense circumstance by Vince Langan (or what appeared to be his identical twin) of East Mountain High School (Sandia Park, NM) together with accomplice on 3 October 2007-
How that may relate to a few weeks later a silenced bullet narrowly missed me and punched a hole in a vehicle I was walking past at Lindau, Germany-

Under what circumstance further stalkings and what appear to be assassination attempt relating to my t-mobile phone being patched directly through to the t-mobile usa network while I was in the greater Frankfurt region, Limburg and Weisbaden, particularly in late March-early April 2008, bypassing ‘t-mobile-D’, screen showing and phone behaving just as though I were in the USA, and any relationship of that to the preceding-

And related to all of the above, review the activities of (REDACTED) as to whether or not she is or has been an asset of yours or any agency of the USA or has been in a quid pro quo relationship with yours or any agency of the USA or  in any capacity or related investigations or actions going to the preceeding paragraphs, cooperated in any investigation or related action concerning me directly or indirectly, with her befriending myself for the purpose at any point in any investigation, of soliciting enough information to implicate but in fact negligently and mistakenly implicate me, short of soliciting enough information to clear me, relating to any actions and/or existing referals of yours or of any USA agency, or any person relating to any such investigations, actions or agencies- impacting my Social Security Benefits in such a way as to effectively use official capacity to bring me into the jurisdiction of the USA or otherwise tamper with my freedom of movement or any other impact on my civil liberties in a ‘R.I.C.O.’ like criminal enterprize, or under any other circumstance related to the preceeding paragraphs, cause undue review of my social security file constituting harassment and hardship in my or my family members lives-

And request the Inspector General for the United States Department of Justice independently inquire of the appropriate authorities in the Federal Republic of Germany as to any known facts of any investigations which may have been or are ongoing relating to any/all of the preceding.
I am BCC copying this communication to two attorneys, one in the USA and one in Germany. These are NOT my attorneys of record. I am copying them because they are discreet men I trust as possessing the highest possible ethical standards and I want a record of this mail in the hands of trusted 3rd parties- which includes any lawful authority, attorney or other person they may, in their discretion, additionally decide it is appropriate to place copies with.

Sincerely
Ronald Thomas West

This letter (above) was not rejected by the FBI mail server, sent to albuquerque@fbi.gov but it was not long after, I began receiving this following response to mails copied to the FBI at Albuquerque (I had, up to then, copied the FBI on my activities)

—– The following addresses had permanent fatal errors —–
<albuquerque@fbi.gov>
(reason: 550 #5.1.0 Address rejected sylvia.maruffi@ic.fbi.gov)

—– Transcript of session follows —–
… while talking to ic.fbi.gov.:
RCPT To:<sylvia.maruffi@ic.fbi.gov>
<<< 550 #5.1.0 Address rejected sylvia.maruffi@ic.fbi.gov
550 5.1.1 <albuquerque@fbi.gov>… User unknown

This (preceding) indicates my mails had been previously routed through to a ‘Sylvia Maruffi’ who appears to have been removed and her address at the Albuquerque office cancelled or changed.

In an unrelated Albuquerque Federal Court pleading that had been posted online by a litigant in May of 2009, I found the following statement:

“.. the situation being reviewed by Sylvia MARUFFI an FBI Investigative Analyst”

This clearly points to FBI Agent Sylvia Maruffi assigned to investigating myself up to the time of the letter sent to the FBI Albuquerque office on 18 February 2009 and Maruffi clearly being a ‘person of interest’ in relation to persistent attempted murders (of myself.) Incidental to this, the FBI has never acknowledged my (emailed) letter of 18 February 2009, although they were clearly in receipt of this communication.

6

I lived in Berlin from September 2010 through July of 2012. Of several incidents over this period, this one stands out:

While living in Charlottenberg (Berlin) during July 2011, I had my 1st experience with intelligence agencies using proselytizing evangelicals as cover for an assassin team. I’ve puzzled a bit over whether “Jews for Jesus” were a MOSSAD or joint MOSSAD/CIA venture but by now I’ve settled on MOSSAD. It was a Wayne Madsen article had pointed out the CIA had used missionaries in the past, in Latin America particularly, but Jews for Jesus are an altogether different animal. In Berlin, no one is going to poke their nose into the business of any Jew, it is a perfect (the MOSSAD  must think) cover. This appeared to be another case of ‘quid pro quo’ (previous ‘quid pro quo’ by MOSSAD in the attempt made on the U7 line in Berlin, 14 October, 2007) or one nation’s agency intelligence acting on behalf of another nation’s intelligence agency, this is not at all unusual.

It is a double blind deniability built into operations, evangelical Christians posing as Jews. Four out of five or perhaps nine out of  ten of these so-called “Jews for Jesus” are deceived and unsuspecting evangelicals simply trying to convince people to be ‘saved.’ They are flown in from around the world in shifts volunteering time as missionaries and are conveniently on hand to locate to any area where a hit operation is meant to take place.

The target is supposed to get used to seeing them in his/her area and this is supposed to produce a complacency surrounding the missionaries while your habits are studied, which U-Bahn (underground) you take and most regular times. By the time any target is used to and ignoring “Jews for Jesus”, with routines established, the unsuspecting proselytizing members are replaced with kill teams from MOSSAD wearing ‘Jews for Jesus” shirts and the target (the theory must go) will not notice he/she has been marked going into the subway where a most ‘unchristian’ poison needle is a heart-attack inducing prick in the crowd that cannot be easily picked out of  security video and so it is one more joins the people who drop dead of natural causes everyday, it’s that simple. Except when it is not that simple, as when the target is onto what is going on, because the intelligence agency is stupid.

When Americans flown in from the Midwest Bible Belt have been replaced by Israelis whose general demeanor, facial expression and body language is top to bottom different from the duped evangelicals (who should not, after-all, be surprised that actual Jews would be involved with their organization), it is not going to be missed by someone with my level of training. It was in Charlottenberg, I noticed it a couple of Israelis studying my habits, while it was Americans covered the larger public area I frequented, for a few days, and then it was Israelis had staked out my U-Bahn entry. I entered, but instead of going down a 2nd level and taking the train, I walked out another entrance, as though I was using the U-Bahn station as a method to cross an intersection without having to deal with above ground traffic lights and ‘walk’ signals, while watching for any tail I might pick up and sure enough… a tall Israeli in civilian clothes (no ‘Jews for Jesus’ shirt) reversed direction and emerged behind me but I was ready for this, and had positioned myself with back to wall at an outdoor café table, sandwiched between people also facing him with backs to wall and he could not hit me with his needle without giving himself away. Totally the wrong crowded scene, it was my advantage, not his. He stupidly studied my circumstance for a minute, hesitating, starting to leave, stopping to study again, wondering what to do while obviously completely out of sorts, gave up and left as I’d been looking steadily and directly at him and him at myself.

In August 2012, I moved to a small village in in the south of Germany.

Note 15) It was August, 2011, (REDACTED), who’d mostly gone out of contact with myself after I’d hand delivered the glass pellet captured by my hat in Wiesbaden, to be delivered for analysis, and followed on with delivering the incriminating Badger-Two Medicine file to him, came into contact just long enough to make excuse to terminate our close association (he accused me of writing “Hate” in reference to my satire compositions) of nearly twenty years. My impression is (REDACTED) had lost his nerve.

7

In November 2012, I visited Berlin and had a close encounter with a would be assassin on the U7 underground (3rd U7 attempt over 5 years), and this incident was the proverbial straw that broke the camel’s back.

By now, with 5+ years of German domestic authorities aware of and/or following my odyssey, with no action taken to pursue justice, no arrests, and no prosecutions, I came to realize there likely would be no action whatsoever taken, so long as a USA sycophant, conservative government ruled in Germany. After some period of reflection, I resolved to push back at the German government. I devised a legal strategy to bring a heat against Germany in the International Criminal Court for aiding and abetting the USA in crimes that the USA could not be prosecuted directly for, as the USA does not belong to the Rome Statute creating the court. I also resolved to push information on Christian extremism at the Pentagon, material I’d gained in informal cooperation with the Military Religious Freedom Foundation (since June, 2008), on German parliamentarians, together with the copious anti-Semitic hate mail directed against the foundation, provided to myself by Mikey Weinstein, MRFF president. These efforts began from my hideout in Southern Germany, in 2013.

Note 16) According to a Washington Post investigative report in 2011, “some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States. An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.”

This is bolstered by a bloomberg.com article: “Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency”

Additionally, the US Congressional watchdog GAO [Government Accounting Office] reports as a result of faulty data, US intelligence agencies: “are not well-positioned to assess the potential effects of relying on contractor personnel”

And then, a US Army Intelligence Officer stated to Buzzfeed: “I think if we had the chance, we would end it very quickly.” [USA intelligence would like to find Snowden] “Just casually walking on the streets of Moscow, coming back from buying his groceries. Going back to his flat and he is casually poked by a passerby. He thinks nothing of it at the time starts to feel a little woozy and thinks it’s a parasite from the local water. He goes home very innocently and next thing you know he dies in the shower.”

In fact most of the unlisted events (in this chronology) experienced by myself had to do with evading stalkers whose behaviors profiled for action as described in the paragraph preceding.

This points to the utter corruption of American intelligence, where a corrupt Pentagon, that has thrown the rule of law under the bus, and associated corrupt corporate personalities (e.g. Christian extremists Condoleezza Rice and former NATO Supreme Commander & Obama National Security Adviser General James Jones, in association with CHEVRON) can access top secret material via the Pentagon’s NSA (National Security Agency) for essentially any purpose they please, up to and inclusive of assassination.

8

2013 was mostly uneventful, relating to attempts on my life, working from my South German safe house. I managed to file the complaint with the International Criminal Court against Germany (presently on hold while the court waits for me to provide further information), and initiated a campaign to educate the German parliamentarians on the Pentagon led Christian extremism infecting NATO. In September 2013, I relocated to Leipzig. In December 2013, I left Germany to live with my girlfriend in (REDACTED.) We registered as living together and three weeks after, I was presented with an Ministry of Interior order expelling myself from the country. The order is in force throughout the European Union and consequently I am under daily threat of deportation to the USA. It is utterly immoral to force myself to seek political asylum in this circumstance but in fact that is precisely what may be required, in this ongoing travesty of justice where institutions of law have refused to move against the criminals I have exposed to the authorities.

9

The result of what I have named ‘alpha’ investigation is clear.

Corporate organized crime in the military-industrial complex fused with institutions in NATO and rogue elements in intelligence agencies (with the beyond Orwellian twist of ‘Christian Dominionism’ thrown in), together form an international ‘deep state’ dedicated to the subversion and eventual overthrow and/or control of western democratic institutions. The German government and law enforcement is now fully aware of ‘alpha’ elements that have operated exterior to the parameters of law in Germany. Incidental to this, alpha’s operational command and control centered in the USA has had the German political establishment intimidated at the highest levels.

With the German government well aware of all the necessary facts concerning ‘alpha’, from police at the local level to the top politicians in Germany, there is really little more to accomplish. The ‘alpha’ investigative result cannot stay swept under the rug indefinitely, too many people now know what is happening, and ultimately, I have little control over when it breaks into the open or how it will develop subsequently. This will have to do with any remaining institutions concerning the rule of law which have not yet been co-opted by the criminal enterprise behind ‘alpha.’ It is the undeniable responsibility of these institutions to take the information developed surrounding ‘alpha’ forward; towards restoration of an authentic constitutional order.

Note 17) In Germany, where there is no hesitation to arrest and prosecute Islamic terror cells bent on conspiracy to murder, four successive German Interior ministers have failed to act against the same behaviors when conducted by, or on behalf of, Christian extremists in American intelligence and associated corrupt personalities pursuing crimes on German soil. Those German Interior ministers, in order of tenure, are:

Wolfgang Schäuble, 22 November 2005 to 28 October 2009

Thomas de Maizière, 28 October 2009 to 3 March 2011

Hans-Peter Friedrich, 3 March 2011 to 17 December 2013

Thomas de Maizière, 17 December 2013 to present (2nd term)

-Ronald Thomas West, February 2014

Post script note would be, the case for Montana Blackfeet sacred lands and the New Mexico East Mountain charter school were coincidental but ultimately convergent; crossing common or related interests in the military-industrial complex.

 

Mark

Related:

Assassination attempt in Berlin

Assassination attempt in Catalonia

Deep State I Background

Deep State II FBI complicity

Deep State III CIA narcotics trafficking

Deep State IV NATO & Gladio

Deep State V Economics & counter-insurgency

Deep State VI Opus Dei & Christian Dominion

Deep State VII The Coe Cult & ‘The Donald’ Election Scam

Deep State VIII Pentagon Papers, CIA and the Lie of Daniel Ellsberg

GLADIO

Profits of War The Israeli connection

Fear of Minor Debris On 9/11

 

 

*

Ron10

*

For years informed people (includes myself) had been pointing out a known principle of social physics in relation to the western democracies aggressions abroad; ‘force escalates violence’ also known as ‘blow-back.’ In the military application of this principle, if you are a line officer, you are well aware when increased force is committed to assaulting an enemy position, the cadence or pace of firing increases. The immediate effect will be increased destruction & casualties, and the aftermath will be either control of the enemy position or having been repulsed. In either case, the attacking force might then see a counter-attack, depending on the battlefield resources and one side’s superior ability to recover manpower and munitions (logistics) in relation to the other. In past times, this micro-cosmic battlefield phenomena reflected a larger social reality in outcomes; States and societies enforcing one’s will upon another. The evolution of the resultant laws of war is primarily based in European history and can trace its roots to Imperial Rome and beyond, to the time of Plato and Alexander.

The larger European culture had exported this social aggression to the world abroad, to feed its own intra-cultural aggressions via the wealth exploited from the so-called ‘uncivilized’ or  ‘undeveloped’ world (colonialism), such as the silver mines of Peru funding the Spanish Armada. Colonies funding European cultural aggression has been their primary function despite self-justifications such as bringing ‘civilization’ to those (Europeans historically presume) less culturally developed than themselves. Such attitudes are not far beneath the surface as cultural driving forces to this day and we see it not only in the Euro-centric history our children are taught but also in the images and rhetoric. Whether in the inter-cultural aggression monument to Columbus at Barcelona:

ColombusMonument

Or the intra-cultural aggression in a monument to the defeat of Napoleon at Leipzig:

NapoleonDefeat

Or Napoleon’s so-called ‘burial’:

NapoleonBurial

Or Germany continuing celebration of historical warmongers such as Prussian King Frederick II who put Germans on the path to become the nastiest regime in modern history:

FrederickII

Or ‘American exceptionalism’ where Obama states: “I believe that America is exceptional. In part because we have shown a willingness, through the sacrifice of blood and treasure, to stand up not only for our own narrow self-interest, but for the interests of all.”  The NAZIs believed they were exceptional as well:

ObamaUN

All of these elements celebrate European cultural aggression, whether inter or intra-cultural aggression, in a sense portrayed with pride. What is missing from the imagery and rhetoric in the European (includes USA) cultural experience is the utter lack of any examination of repeated and compounded consequence of pursuing empire:

WTC_aftermath

Whether a ‘Reichstag fire’ or an event manipulated to same effect by perpetrators of imperialism, ‘blow-back’ is real, from reactions to war-profiteering enterprises (Lockheed-Martin, General Dynamics, JP Morgan, et al) capitalizing on 9/11 to an Afghan national who only the other day put his finger in my face and stated “I have a problem with you” because I’m an American and Americans are unnecessarily blowing up women and children in Afghanistan with airstrikes and drones.

So, what is imperialism? It is a concept central to European mentality in ways they are not even aware of. I don’t agree with every motive for and proposed solution to imperialism in this following video but I do agree with the fact imperialism is the most destructive force on earth, that it is Euro-centric cultural mentality and that it must be contained, reversed and ended. I do not believe Euro-centric mentality is race based White Supremacy, I believe this is only one self-justifying rational for manifestation of a cultural mentality that employs religion, science and more, to justify an infectious, ego-based narcissism and attending aggressive, violent greed that ultimately transcends race. North Korea’s Kim, as well the Black kleptocrats who’ve hijacked South Africa, or for that matter, Obama, are little different to any European Whites in their narcissistic motives and behaviors in my view. Kim would probably join the capital club tomorrow if the USA would give up hypocritical demands of democracy & human rights and pull the war games out of North Korea’s face, and South Africa’s new Black oligarchs seem to believe they can snooker South Africans indefinitely with the USA turning a blind eye because they have become ‘players.’ Obama’s policies look like the policies of George Bush on steroids, except covered up by media allowing Obama to be a convincing liar and Obama can actually speak decent English, two things Bush could never really master. But it is easy to see how White Supremacist motive would be interpreted as the progenitor of imperialism, because imperialism as we know it in these modern times not only originated with, but has been largely sustained by Europe and consequent aligned Euro-centric cultures and mentality, particularly the USA. We know from history that White captive children raised Native American never wished to return to the White community (mentality.) It’s just White people’s (and consequently the world’s) bad luck the mentality behind imperialism took root in Europe, in my estimation.

All that said, I challenge everyone who has read this short essay to watch this video in its entirety. It is multiple voices hammering on a single theme … attempting to define imperialism. I know some of these people and respect them a LOT. Not because we always agree (we don’t always agree) but because they care immensely about pulling our world out of its downward spiral and that is a noble goal we all should share:

 

Note on the video: The included ‘double tap’ footage from Wikileaks is the only leak of Private Manning (as an armed forces member) I feel was legally justified, because it is a war crime of murdering people who’d arrived to evacuate the wounded, on top of it is obvious from the voice recording the attack helicopter crew had no clear knowledge of who they were firing on. For the record, I am a staunch supporter of Snowden.

Afterthought: The USA and Western Europe aggressively pushing Russia into a corner with the destabilization of Ukraine (latest in a long list of provocations) on behalf of present (Yulia Tymoshenko, example given) and future oligarchs in a push for world-wide American corporate ‘manifest destiny’, may become the case of intra-cultural European aggression that forces Russia, with a LOT to lose, to end the ‘great game’ once and for all.

Something to think about in a nuclear armed world…

*

Last update March 2021: The wikiwatchdog online search tool has finally gone out of existence after long or intermittent periods of downtime, with the William ‘Bill’ Colby article edits previously documented and discussed in this following piece having vanished from the database (the CIA finally has its desired result.)

A 2007 Wired Magazine article on wikiscanner (taken down shortly after this article’s initial publication) exposed the CIA (among others) as anonymous editors of Wikipedia. Deliberate, professionally engineered disinformation (information operations, psy-ops) is a long used tool of intelligence agencies, with a military history to ancient times. Other than CIA, with its’ extensive history of modern media manipulation, other organizations editing Wikipedia would certainly include the the USA’s Defense Intelligence Agency, British MI6, Israeli MOSSAD, other intelligence agencies and numerous corporations. A sort of ‘you are what you eat’ philosophy applied to ‘you will be what you think’ on behalf of CHEVRON, Diebold, Booz Allen, Westinghouse, General Dynamics, the International Chamber of Commerce, NATO and too many more modern gods worshiped at the temple of western military industrial capital to be named.

On the CIA anonymous edits of Wikipedia, there is one of particular interest. The entry on William ‘Bill’ Colby, a former Director of Central Intelligence, had some particularly damning information deleted (information that was never restored.) Using the wikiscanner replacement ‘WikiWatchdog‘, I was able to track down this following CIA edit. The Bold text is text deleted by the CIA:

“Shortly thereafter, an OSS friend offered him a job at CIA, and Colby accepted. Colby spent the next twelve years in the field, first in Stockholm, Sweden. There, he helped set up the stay-behind networks of Gladio, a covert paramilitary organizations organized by the CIA in order to prepare an eventual Soviet invasion, as he later described in his memoirs. According to a November 25, 1990 article by the Danish daily newspaper ”Berlingske Tidende”, quoted by Daniele Ganser in his 2005 book on Gladio, a source named “Q” confirmed William Colby’s revelations in his memoirs about the setting-up of stay-behind armies in Scandinavia

“Colby’s story is absolutely correct. Absalon was created in the early 1950s. Colby was a member of the world spanning laymen catholic organisation Opus Dei, which, using a modern term, could be called right-wing. Opus Dei played a central role in the setting up of Gladio in the whole of Europe and also in Denmark… The leader of Gladio was Harder who was probably not a Catholic. But there are not many Catholics in Denmark and the basic elements making up the Danish Gladio were former WW II resistance people – former prisoners of Tysk Vestre Faengsel, Froslevlejren, Neuengammeand also of the Danish Brigade.

“William Colby then spent much of the 1950s based in Rome, where he led the Agency’s covert political operations campaign to support moderate anti-Communist parties. After World War II, Italia was the first ground for the CIA covert operations to stop the Communist from legally taking power, in a strategy later dubbed ‘strategy of tension’ by the Italian press.

“On April 27, 1996, Colby died in a supposed boating accident near his home in Rock Point, Maryland. He reportedly did not mention any canoeing plans to his wife, nor was it normal for him to go boating at night. Colby had left his home unlocked, his computer on, and a partly eaten dinner on the table. Colby’s body was eventually found, underwater, on May 6, 1996. The life jacket his friends said he usually wore was missing. The body was found 20 yards from the canoe, after the area had been thoroughly searched multiple times. The subsequent inquest found that he died from drowning and hypothermia after collapsing from a heart attack or stroke and falling out of his canoe. There is no evidence that Colby went canoeing. There is no evidence that Colby died on April 27, 1996. Colby disappeared April 27, 1996. His body was recovered on May 6, 1996. Hence, the date of Colby’s death is somewhere between these two dates. The Internet Movie Database states Colby died on May 6, 1996. Colby was laid to rest at Arlington National Cemetery on May 13, 1996.

“Conservative news reporter Christopher Ruddy (as part of the Arkansas Project) has claimed President Clinton had Colby murdered because Colby was going to write about a conspiracy between Clinton and Vincent Foster.

“The former CIA director acknowledged to Nebraska State Senator John DeCamp that the scenario described in the documentary, ‘’Conspiracy of Silence’’, is real, which tells of a sex ring that had links to political conservatives in Washington D.C. Not long thereafter Colby turned up dead under suspicious circumstances. John DeCamp has since authored The Franklin Coverup. This all came to public view on the morning of June 29, 1989, when the ”Washington Times’ headline was “Call Boys Took Midnight Tour of White House.””

Bearing in mind this is a single editing incident (according to the WikiWatchdog program) “edit on 2006-06-20 at 18:32:45 by 198.81.129.186 (relay301.net.cia.gov)” [20 June 2006 at 6:32pm] it should be noted since, in a subsequent, unattributed edit (not shown in bold in the preceding), this additional information had been deleted:

“He reportedly did not mention any canoeing plans to his wife, nor was it normal for him to go boating at night. Colby had left his home unlocked, his computer on, and a partly eaten dinner on the table. Colby’s body was eventually found, underwater, on May 6, 1996. The life jacket his friends said he usually wore was missing. The body was found 20 yards from the canoe, after the area had been thoroughly searched multiple times. The subsequent inquest found that he died from drowning and hypothermia after collapsing from a heart attack or stroke and falling out of his canoe. There is no evidence that Colby went canoeing. There is no evidence that Colby died on April 27, 1996. Colby disappeared April 27, 1996. His body was recovered on May 6, 1996. Hence, the date of Colby’s death is somewhere between these two dates. The Internet Movie Database states Colby died on May 6, 1996.”

This second edit had been made since the CIA had learned to cover its tracks, as the edit of 20 June 2006 had been made before the tracking software referred to in the 2007 (now deleted) Wired article had been developed and released. The new ‘WikiWatchdog’ is a subsequent development to the original software which appeared to have been sabotaged. With the WikiWatchdog, this is perhaps a short lived opportunity, WikiWatchdog most certainly will be attacked to prevent articles such as this one (indeed the life of wikiwatchdog does seem to have been short, I notice the links to wikiwatchdog are dead, as this article took off with numerous reads on 15 July 2014, the link has been subsequently restored, but tool’s functionality appears to be disabled; author’s note)

There are several ‘hot button’ issues buried by the noted CIA changes to the Wikipedia article on William Colby, circumstance of Colby’s death, Opus Dei’s involvement with ‘Gladio’, the death of Vince Foster and the ‘Franklin Scandal.’

edit on 2006-06-20 at 18:32:45

by 198.81.129.186 (relay301.net.cia.gov)

– See more at: http://wikiwatchdog.com/#!search/en/cia.gov/456228/59666700

edit on 2006-06-20 at 18:32:45

by 198.81.129.186 (relay301.net.cia.gov)

– See more at: http://wikiwatchdog.com/#!search/en/cia.gov/456228/59666700

We can use this following, related, short Wikipedia article (disinformation) on the Franklin Scandal as a point of reference:

“The Franklin child prostitution ring allegations took place between 1988 and 1991 and involved an alleged child sex ring serving prominent citizens of the Nebraska Republican Party, as well as high-level U.S. politicians. The allegations also claimed that the alleged sex ring was led by, “a cult of devil worshipers involved in the mutilation, sacrifice and cannibalism of numerous children.”The allegations centered on the actions of Lawrence E. King Jr., who ran the now defunct Franklin Community Federal Credit Union (FCFCU) in Omaha.

“State Foster Care Review Board submitted the results of a two-year investigation into the physical and sexual abuse of foster children to the Executive Board of the Nebraska Legislature, who were investigating reports of child sexual abuse linked to the credit union. Authorities launched a probe, interviewing a number of claimed abuse victims who said that children in foster care were flown to the U.S. East Coast and were abused at “bad parties.” After investigation, a grand jury in Douglas County (of which Omaha, Nebraska is the largest city and county seat) determined the abuse allegations were baseless, describing them as a “carefully crafted hoax” and indicted two of the accusers on perjury charges.The grand jury also suggested that the abuse stories originated from a vindictive employee terminated by Boys Town, the famed refuge for troubled youths. Later, a federal grand jury concluded that the abuse allegations were unfounded and indicted 21 year old Alisha Owen, an alleged victim, on eight counts of perjury. The same grand jury also indicted multiple officers of the credit union, including King, for crimes related to the embezzlement of funds from the credit union. Alisha Owen served 4-1/2 years in prison.

“Historian Philip Jenkins explored how hot topics such as the Franklin allegations, whether or not they are worthy of attention or credible on their own merits, are seized by political opportunists for their own purposes. He also described how cases such as the Franklin allegations can acquire credibility, even if they lack any credibility inherently, when reported in various media in a credulous voice. Numerous conspiracy theories evolved and persist, claiming that the alleged abuse was part of a widespread series of crimes including devil worship, cannibalism, drug trafficking, CIA arms dealing and links with the first Bush Administration.

This preceding is the entire text of the Wikipedia article on Wednesday, 5 February 2014.

Of the several problems with this article, including the missing fact the lead investigator’s private plane disintegrated in mid-air and the grand jury had been mislead by prosecutors, most remarkable is the omission of any reference to the “Conspiracy of Silence” documentary film funded by the Discovery Channel and produced by Yorkshire Television of Britain. This suppressed film contains video testimony of several of the professional participants in the investigation, absolutely refuting the Wikipedia article, as well detailing how the FBI engineered a cover-up of the Franklin Scandal (Author’s note: this video was killed at youtube on 15 July 2014, when this article took off with hundreds of hits. Fortunately, vimeo provides an alternative site to watch)

And then you have:

“What you have to understand, is that sometimes there are forces and events too big, too powerful, with so much at stake for other people or institutions, that you cannot do anything about them, no matter how evil or wrong they are and no matter how dedicated or sincere you are or how much evidence you have” -Former CIA Director William Colby to “Franklin Coverup” author John DeCamp.

Further refuting Wikipedia is the work of Nick Bryant, a journalist who not only penned “The Franklin Scandal” but has unimpeachable credentials:

Nick Bryant’s writing has recurrently focused on the plight of disadvantaged children in the United States, and he’s been published in numerous national journals, including the Journal of Professional Ethics, Journal of Applied Developmental Psychology, Journal of Social Distress and Homelessness, Journal of Health Care for the Poor and Underserved, and Journal of School Health. He is the co-author of America’s Children: Triumph of Tragedy, addressing the medical and developmental problems of lower socioeconomic children in America” -franklinscandal.com

What more do you need to know? The Penn State child rape [Sandusky] scandal has ties to the Franklin case:

“The Penn State Sandusky scandal is getting weirder by the day. Besides the delays in reporting a serial child molester for years, in the past week conflicts of interests in presiding judge as well as Penn State investigating committees, we have learned that Sandusky’s lawyer impregnated an underage teen in the past, and a bizarre Sandusky interview with Bob Costas made news. The most amazing link however has been identified by researchers into [Penn State President] Graham Spanier’s past. If it is not odd enough that Mr. Spanier was complicit in not reporting the Sandusky rape to the police, Mr. Spanier has a direct link to the sordid “Franklin Scandal” in Omaha, Nebraska (child kidnaping for sexual abuse and trafficking scandal). Looking at Mr. Spanier’s biography, one can easily see that he served as Chancellor at University of Nebraska-Lincoln from 1991 to 1995 right towards the end of the Franklin scandal. Please note that Lincoln Nebraska is a short drive away from Omaha where most of abuses occurred. If the proximity is not creepy enough, Mr. Spanier’s long time friend and associate Ronald Roskens (former University of Nebraska chancellor and president) was directly linked to the Franklin Scandal as well as its ringleader Lawrence King. Roskens was fired in 1989 from his post when his involvement in various orgies was reported on (incl. surveillance photos of nude young boys in Rosken’s home) . It is shocking to realize this link when one knows of the abhorrent and deviant abuses which occurred in Omaha during this time and which in a similar fashion to the Penn State scandal was able to persist for too many years”

In fact Sandusky’s children’s charity, “The Second Mile“, was one of George H.W. Bush’s “1,000 points of light” This fact had not been killed by edits at Wikipedia (yet.)

“U.S. President George H. W. Bush praised the group as a “shining example” of charity work in a 1990 letter, one of that president’s much-promoted “Thousand points of light” encouragements to volunteer community organizations. Citing Sandusky’s work with The Second Mile charity to provide care for foster children, then U.S. Senator Rick Santorum honored Sandusky with an Angels in Adoption award in 2002″

Organized child rapes spanning three decades focused in Republican religious right circles with ties directly to the George H.W. Bush White House (children were given private White House tours prior to being raped by DC power brokers) cannot seem to be sorted by Wikipedia scholarship. And this is because you have CIA (among other organizations) editing Wikipedia. It does well to remember here, George H.W. Bush is a former Director of CIA.

Child Rape also has been authorized by ‘The Family’,  the organization sponsoring “The National Prayer Breakfast” (with stellar personalities like former NATO Supreme Commander General James Jones giving keynote speeches, not only Presidents of the United States) , also the group spiritually advises persons no less than U.S. Senator John Ensign, et al:

“David Coe, Doug Coe’s son and heir apparent, calls himself simply a friend to men such as John Ensign, whom he guided through the coverup of his affair. I met the younger Coe when I lived for several weeks as a member of the Family. He’s a surprising source of counsel, spiritual or otherwise. Attempting to explain what it means to be chosen for leadership like King David was — or Mark Sanford, according to his own estimate — he asked a young man who’d put himself, body and soul, under the Family’s authority, “Let’s say I hear you raped three little girls. What would I think of you?” The man guessed that Coe would probably think that he was a monster. “No,” answered Coe, “I wouldn’t.” Why? Because, as a member of the Family, he’s among what Family leaders refer to as the “new chosen.” If you’re chosen, the normal rules don’t apply” 

Other ‘family’ members:

“Sens. Chuck Grassley, R-Iowa, and Jim DeMint and Lindsey Graham, both R-S.C.; James Inhofe, R-Okla., John Thune, R-S.D., and recent senators and high officials such as John Ashcroft, Ed Meese, Pete Domenici and Don Nickles. Over in the House there’s Joe Pitts, R-Penn., Frank Wolf, R-Va., Zach Wamp, R-Tenn., Robert Aderholt, R-Ala., Ander Crenshaw, R-Fla., Todd Tiahrt, R-Kan., Marsha Blackburn, R-Tenn., Jo Ann Emerson, R-Mo., and John R. Carter, R-Texas. Historically, the Family has been strongly Republican, but it includes Democrats, too. There’s Mike McIntyre of North Carolina, for instance, a vocal defender of putting the Ten Commandments in public places, and Sen. Mark Pryor, the pro-war Arkansas Democrat responsible for scuttling Obama’s labor agenda. Sen. Pryor explained to me the meaning of bipartisanship he’d learned through the Family: “Jesus didn’t come to take sides. He came to take over.” And by Jesus, the Family means the Family” –Sex & Power inside the C Street House by Jeff Sharlet

The leading ‘liberal’ light under the guidance of ‘The Family’ ? None other than Hillary Clinton according to Mother Jones Magazine:

“in Living History, [Hillary] describes her first encounter with Fellowship leader Doug Coe at a 1993 lunch with her prayer cell at the Cedars, the Fellowship’s majestic estate on the Potomac. Coe, she writes, “is a unique presence in Washington: a genuinely loving spiritual mentor and guide to anyone, regardless of party or faith, who wants to deepen his or her relationship with God””

In case you miss the the significance of Ed Meese belonging to ‘The Family’, Meese mentored Antonin Scalia to the Supreme Court of the United States. Meese went on to found ‘The Federalist Society’, a corporate cesspool of religious right personalities loaded with both George Bush (father & son) associated personalities reading like a who’s who of the military-industrial rich and powerful and minions like Condoleezza Rice and torture lawyer John Yoo. Since, The Federalist Society has provided us with Supreme Court justices Clarence Thomas, Samuel Alito and Chief Justice John Roberts. These religious right darlings then handed the USA to corporate entities via unlimited media spending with the decision ‘Citizens United.’ You are what you think.

“PAO (Public Affairs Office) now has relationships with reporters from every major wire service, newspaper, news weekly and television network in the nation. This has helped us turn some “intelligence failure” stories into “intelligence success” stories, and it has contributed to the accuracy of countless others. In many instances, we have persuaded reporters to postpone, change, hold, or even scrap stories that could have adversely affected national security interests or jeopardized sources and methods.” -Robert Gates, CIA internal memo (1991)

Jesus and Satan seem like twins here. One  of the biggest complaints surrounding the religious right is they take the bible too literally. Maybe the human sacrifice ritual ‘communion’ isn’t merely a ‘metaphor’ for all of these so-called Christians on Sundays, after all, Christianity, taken literally, compares well to Satanism. In this  case, Wikipedia doesn’t really need to take sides, eh? One’s lies are just as good as the other’s lies.

“The Central Intelligence Agency owns everyone of any significance in the major media.” -William Colby, former CIA Director, cited by Dave McGowan in “Derailing Democracy

More than CIA, I wonder how many Wikipedia editors are employees of the FBI. Or the Defense Intelligence Agency. It’s doubtful child rape is the most pressing reason the Pentagon’s poster child, the National Security Agency, has the USA’s director of Intelligence James Clapper, backed by the FBI & Defense Intelligence Agency, begging in front of Senators for Snowden to return documents, many of which must yet be unread. In fact the journalists in possession of the documents, Snowden himself and admittedly, the intelligence agencies themselves, can’t yet know the full content of the NSA [Pentagon poster child] leaks, the amount is said to be vast. Nevertheless the USA’s top intelligence people and extreme Christian Dominionists running the Pentagon are freaking out and clandestine Wikipedia editors will have their work cut out for them for quite some time:

f6

There’s more truth in the above illustration than in many articles at Wikipedia. If you closely follow what is actually happening, it’s a more accurate portrait of western democracies military-industrial complex war profiteering responsible for social order breakdown and associated worldwide child rape phenomena than any pornographic image, considering:

“You could get a journalist cheaper than a good call girl, for a couple hundred dollars a month.” -CIA operative cited in “Katherine The Great” by Deborah Davis

And you shouldn’t dare trust Wikipedia for information on the so-called ‘Mena Conspiracy’

A number of allegations have been written about and several local, state, and federal investigations have taken place related to the notion of the Mena Intermountain Municipal Airport as a CIA drop point in large scale cocaine trafficking beginning in the latter part of the 1980s. The topic has received some press coverage that has included allegations of awareness, participation and/or coverup involvement of figures such as future president Bill Clinton.

An investigation by the CIA’s inspector general concluded that the CIA had no involvement in or knowledge of any illegal activities that may have occurred in Mena. The report said that the agency had conducted a training exercise at the airport in partnership with another Federal agency and that companies located at the airport had performed “routine aviation-related services on equipment owned by the CIA”

Rather trust what had actually been reported on but is widely suppressed by present mainstream media, not only suppressed by Wikipedia:

Because:

“There is quite an incredible spread of relationships. You don’t need to manipulate Time magazine, for example, because there are [Central Intelligence] Agency people at the management level.” -William B. Bader, former CIA intelligence officer, briefing members of the Senate Intelligence Committee, From ‘CIA and the Media’, by Carl Bernstein

“The Agency’s relationship with [The New York] Times was by far its most valuable among newspapers, according to CIA officials. [It was] general Times policy … to provide assistance to the CIA whenever possible.”CIA and the Media by Carl Bernstein

With the media having become an internet entity, it follows the several corporate entities fused with military and intelligence entities making up our western democracies ‘deep state‘, media is ever more easily manipulated by those whose capital and stocks benefit from the mass killings taking place planet-wide on daily basis. All of this destructive profiteering is engineered in the name of ‘terror’ and ‘security.’ This social engineering of violence catering to the insatiable greed of the western world’s institutions of leadership and associated corporate weapons profiteering personalities, requires a ‘you are what you think’ populace conformed to supporting the world’s greatest criminal endeavors. Wikipedia (not only the New York Times and Washington Post) is an excellent platform for these criminals to produce result on a grand scale.

Related :

Hillary Clinton in Four Short Paragraphs ‘Gott Mit Uns’

Deep State IV NATO & Gladio

Deep State V Economics & counter-insurgency

*

S1

Ronald Thomas West is a former U.S. intelligence professional

Dominionism

Hey everyone, remember Rupert Murdoch bought the Wall Street Journal? So, being interested in and keeping track of certain international criminals, it was eye opening (but no surprise) the Wall Street Journal would set out to ‘rehabilitate’ Frontier Services Group (nee Academi, Xe Corp & Blackwater’s) Erik Prince with an article that gives Prince by far too much leeway as on the up & up, straight & narrow (barfs/laughs.)

The 24 January 2014 Wall Street Journal article on/interview with Erik Prince details Prince’s new joint venture with the People’s Republic of China. Hey, so birds of a feather flock together, gun runner Prince who the Obama administration got off the hook for (among other charges) capital murder with (probably deliberate) bungled prosecutions, the ‘state secrets’ doctrine, & ‘national security’ rationale are events described in the WSJ as:

“several federal prosecutions involving Blackwater employees, most of which fizzled…”

How can Obama Attorney General Eric Holder’s Department of Justice federal prosecutors making sweetheart deals letting Blackwater executives off the hook be construed to be ‘fizzled’ prosecutions? Eric Prince’s criminal legacy is not merely gun running and murder but murder of witnesses:

 

So, who is tucking their tails and running here? Obama’s prosecutors? Or is it the Wall Street Journal afraid to go after an at large, crusading Christian dominion assassin with a proven track record? When Prince was running Blackwater, he was employed by Dick Cheney, Condoleezza Rice, Department of State, CIA and friends on a worldwide assassination program, making him a super multi-millionaire in the process:

 

Now Prince whines the USA let him down. Who is the loser who runs from cowards here? Obama and his ‘look forward, not back’ policy of letting international criminals run free? Or Prince, who bailed out of the USA to the Gulf Emirates to set up a Christian Janissaries mercenary force and got ‘cold feet’ when his dedication to ‘eradicating Islam from the face of the Earth’ beliefs were spilled into the open and he had to ditch his hideout in the Islamic world? Meanwhile, Prince’s lowest level hired killers are the only ones prosecuted for a murderous killing spree in Baghdad and only one of those is charged with straight-up murder (and will likely get off on technicalities with an appeal.)

Now, China, who has blocked access to every western media outlet who has reported on the database revealing its leadership to be involved in international banking related corruption, is the new Erik Prince ‘joint partner’ in its Africa centered enterprises. China doesn’t mess around when it comes to welcoming proven killers into its’ financial and business world, eh? Nothing like hiring a proven CIA para-military asset that spearheaded covert murders around the world to manage ‘risk’ a-la a CIA veteran Joint Special Operations Command clone, to add a bit of muscle to African ventures propping up regimes whose leadership is wanted at The Hague for crimes of genocide… all the while our Murdoch owned Wall Street Journal’s tepid reporting cannot bring itself to detail Obama’s administration covering up the actual Prince legacy of mass murder for hire in support of our Pentagon’s drive in pursuit of ‘Christian Dominion’ throughout the world. And, of course, the WSJ doesn’t touch Prince bankrolling the USA’s religious right… that’d touch too close to home insofar as the uber-right-wing Murdoch’s ‘Gott mit uns‘ Journal parrots a proven killer’s denial of any further mercenary interests even as Prince is moving around the global mercenary scene like a pedophile priest is moved from parish to parish to conceal his ongoing crimes spree .. perhaps the ultimate ‘Christian mission’ to the proletariat in Mad Magazine’s geopolitic of ‘Spy versus Spy’

There is no rational ‘rationale’ in this world people, only ‘In God We Trust’ also known as ‘show me the money’

*

Drone strikes for Jesus. Christian Taliban. The Pentagon. If you don’t believe in literal Armageddon, you’re “not Christian enough.” These people control the USA’s military arsenal. This is scary stuff folks.

“You’re telling me 28 to 34 percent of our military want 7 billion people to die” [believe in literal Armageddon] … “The simple answer is affirmative”

Between 28 and 34 percent of the USA military has embraced “Christian Dominionism” according to the six time Nobel Peace Prize nominated Military Religious Freedom Foundation.

For my friends on the left, my message is, knee-jerk rejection of Mikey Weinstein for the fact of his being a former White House attorney in the Reagan administration, is one of the dumbest things you could ever do-

ObamaPick

^ Sauron

sardonic |särˈdänik|
adjective
grimly mocking or cynical: Stoner attempted a sardonic smile.
DERIVATIVES
sardonically |-ik(ə)lē| adverb.
sardonicism |-ˈdänəˌsizəm| noun
ORIGIN mid 17th cent.: from French sardonique, earlier sardonien, via Latin from Greek sardonios ‘of Sardinia,’ alteration of sardanios, used by Homer to describe bitter or scornful laughter.

Sardonicism is an unnecessarily clumsy word. So, I’ve changed it to ‘sardonism.’ With an English language lexicon of one million words, no one should notice one more, you think? Sardonism could refer to a religion dedicated to minimizing our world’s problems or, alternatively, reducing our political leadership to the lowest common denominator. Think of ‘moroncy’ as in ‘I dub thee peer in the realm of morons.’ Sort of like the Queen creates peerages and made Maggie Thatcher a Baroness (‘moroness’ actually) … recalling Mitterrand had observed Maggie having ‘the eyes of Caligula.’ A perfect example of practicing ‘sardonism.’

Now, it also occurs to me I like the word ‘sardonism’ because it somewhat rhymes with ‘sauronism’, that is, if we assume there are people who worship Sauron. You know, tossing that cursed ring into the fires of Mount Doom. ‘Ohhh, my precious…’ so where the fuck is Frodo when you most need him? Because today I was watching the wretched sorcerer Saruman, ah-hem, I actually meant John Kerry, expressing his ‘grave concerns’ about the growing forces of al Qaida in Syria spilling over to Iraq.

U.S. Secretary of State John Kerry testifies at a U.S. House Foreign Affairs Committee hearing on Syria on Capitol Hill in Washington

^ “I have no idea how al Qaida gained control”

John Kerry, I hereby dub thee peer in the Realm of Morons, Puke of Hypocrites, and Prince of Knavery.

knave |nāv|
noun archaic
a dishonest or unscrupulous man.
DERIVATIVES
knavery |-vərē| noun (pl. knaveries)
ORIGIN Old English cnafa ‘boy, servant’; related to German Knabe ‘boy.’

In the German : ’boy.’ Perfect.

Conveniently, as a child who only lives in the moment, self-serving Kerry neglects to remember who made the arrangement which has al Qaida affiliated ‘opposition’ groups largely in control of ‘rebel’ held areas of Syria and taking over Iraq. Nothing like making a George Bush lie of Iraq a safe harbor for al Qaida into a reality, eh?

Sort of like when children play ‘Cowboys and Indians’, you can shift sides at will, pursue make-believe with any story line, and, of course, rewrite history as the imaginary play goes on. But, what is the real storyline for those who will be charged with fixing the neighborhoods broken windows with the game spun out of control?

ALEPPO

^ Aleppo, Syria

Many of us have heard the vulgar slang ‘circle-jerk’ and ‘cluster-fuck’ but what is the term to describe the group fellatio of John McCain, Joe Lieberman, John Kerry and Barack Obama, all failed personalities in foreign policy whose most consuming ambition had been to be President of the United States? With political blow-jobs all around, these ‘dukes of hazard’ pushed into play the CIA working with Saudi Arabia to arm the Syrian ‘opposition.’ The USA provided the training and facilitated Saudi Arabia (among others) funneling arms to the so-called ‘rebels.’ Trained and armed, where do these ‘rebels’ end up? Where the most money and narcissistic prestige (outside of Washington DC) is, that is al Qaida. Why thank you John & Joe McLieberman!

McLiberman

Picking out a bed at Ikea

The result? Al Qaida affiliates are the most effective force in the USA’s effort to topple Assad, as the ‘opposition’ is going to the Geneva talks with its tail tucked firmly between its legs in face of groups it actually cannot represent in control of major areas held by Syrian ‘rebels.’

Meanwhile, the newly most powerful armed ‘opposition’ group in Syria superseding the al Qaida affiliate al Nusra is al Qaida affiliate Islamic State of Iraq and the Levant, re-expanding its presence in Iraq, taking back Falluja (how many American marines died there?), much of Ramadi and is threatening Bagdad itself. How do you suppose al Qaida got the weapons and training to do this? (see preceding.) Oh and then the ‘Islamic State’ became so extreme, they were disowned by al-Qaida!

These boys who play Cowboys and Indians, smashing the neighborhood windows in the process, at the age of McCain, Lieberman, Kerry and Obama, are clearly boys who never grew up. Is there anyone can take these kids by the ear and march them to a stool where they can be made to sit in a corner? Don’t hold your breath waiting for this to happen, just pray for Frodo.

The Satires

*

Related links

http://news.yahoo.com/key-al-qaida-militant-reportedly-killed-syria-170552209.html

egregious liar

egregious |iˈgrējəs| adjective: outstandingly bad; shocking: egregious abuse of trust.

liar |ˈlīər| noun: a person who tells lies.

Lest anyone mistake my use of this definition in regards to Obama’s speech on the NSA, I mean this in the sense Obama is really good at telling lies. Alternatively, Obama is a pathological liar:

pathological |ˌpaTHəˈläjikəl| (also pathologic)
adjective
compulsive; obsessive: a pathological liar.

The National Security blog “Unredacted’ had yesterday quickly published a refutation of Obama’s claims with an excellent piece on official lies relating to the NSA’s surveillance programs. I will take this bit of work a bit further, pointing out how the USA has become so far removed from the rule of law as to convince our constitution has been utterly, entirely usurped, and Obama’s pro-active, purposeful participation in this world-threatening travesty. But first, keep in the back of your mind: a compulsive liar must tell an ever growing web of lies to cover any previous lies. When the liar has been busted (as Obama has in the ‘Unredacted’ blog), lies never intended to see the light of day must be covered with ‘half-truths’ completely unintended to set matters straight (i.e. more lies.)

Obama on the FISA (secret) court, June 16, 2013: “It is transparent…So, on this telephone program, you’ve got a federal court with independent federal judges overseeing the entire program. And you’ve got Congress overseeing the program, not just the intelligence committee and not just the judiciary committee — but all of Congress had available to it before the last reauthorization exactly how this program works”

Unredacted: “OpentheGovernment.org’s 2013 Secrecy Report notes, “the unchecked expansion in the growth of the government’s surveillance programs is due in large measure to the absolute secrecy surrounding the FISC and how it is interpreting the law. The FISC’s opinions interpreting Section 215 of the PATRIOT Act has allowed for a much broader collection of data than most national security and civil liberties groups, and even some Members of Congress, understood the law to permit””

Obama, June 16, 2013: “What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails”

Unredacted: “the NSA has significant latitude to collect and keep the contents of e-mails and other communications of U.S. citizens that are swept up as part of the agency’s court-approved monitoring of a target overseas.” This information is stored, for up to five years, and can be accessed as soon as the FBI gets a National Security Letter, for which there are still no requirements to seek approval or judicial review when sending”

Other than exposure of egregious lies by Obama and his minions detailed at Unredacted, the problem I have with this is the lack of challenging the secret court per se. My own position is (as a former adjunct professor of American constitutional law), there is precisely ZERO constitutional authority granted to Congress to create a secret court in Article III, section I…

“The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may from time to time ordain and establish”

…because of the Fourth Amendment language…

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized”

…Fifth Amendment langauge…

“No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation”

…and the Sixth Amendment language…

“In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defense”

…with the provisions of these amendments trampled by the very existence of a secret court. All of the preceding constitutional clauses are violated by the very existence of the FISA law. Obama, who still holds a constitutional law professor position at the University of Chicago, and Chief Justice John Roberts, both, know this. What has happened is, what should be a nonexistent distinction has been created between ‘legal’ & ‘constitutional’ in the American body politic, when in fact they must be one and the same. Consequently, unconstitutional (illegal) national security laws are crafted by the congress, signed by the president and upheld by the courts, and this is how ‘color of law‘ is substituted in lieu of constitutional principles (while pretending the constitution holds sway.) Now we have, as a nation, come to accept the idea what is called ‘legal’ but is illegal, is constitutional, when in fact the national security law patently violates the constitution, a national oxymoron. The secret FISA (FISC) court John Roberts should refuse to recognize, but instead has sole authority to appoint judges to, epitomizes a ‘soft power’ coup created by congress, usurping our nation’s rule of law. And so it is Senators like Diane Feinstein can claim “PRISM is legal” while ignoring the constitution (never mind her oath to uphold the same.)

But in fact Obama and Roberts, both trained constitutional law attorneys, know there was never any necessity for a secret court having to do with ‘national security’ on account of a well known principle of American law:

in camera
adverb
‘in camera’ law in private, in particular taking place in the private chambers of a judge, with the press and public excluded: judges assess the merits of such claims in camera. The evidence of the state had been examined ‘in camera’ on national security grounds [‘in camera’, late Latin, ‘in the chamber.’]

If this known principle were applied in normal federal courts, a judge would have the discretion to reject secrecy based on her or his opinion the government’s claims of ‘national security’ were spurious, false or self-serving when balancing any national security claims against a person’s rights when pursuing eavesdropping authority (still unconstitutional in some circumstance perhaps, but by far more legal integrity is preserved because a judge can weigh a wider scope of evidence and chastise the government in open court for misbehaviors.) Obviously this will not do in any state well on its way to being usurped by fascism and is  why we have a patently unconstitutional & subversive secret court. Relevant to this run amok trashing of our foundational law:

While running a murder ring in government as vice president, international criminal Dick Cheney’s top lawyer was Shannen Coffin, Coffin is a close friend of Chief Justice John Roberts. John Roberts appoints the judges comprising the FISC (secret court.) Obama and his Attorney General Eric Holder have persistently refused to investigate and prosecute these criminal personalities, rather working to protect their interests, at the price of our foundational law (constitution’s) promises of personal liberties. Should you be asking yourself why?

Obama Attorney General Eric Holder’s Department of Justice includes the FBI which failed to investigate high profile drug cartel crimes tied directly to politicians in the USA under former Director Robert Mueller. Bush appointed Robert Mueller’s past includes stonewalling international narcotics money laundering investigations. Following on Robert Mueller, Obama appointment James Comey went from drug money laundering HSBC board director to FBI Director. What should we think about that?

Attorney General Holder had, in his past, arranged immunity for and to conceal the identities of corporate personalities responsible for providing cash and machine guns to a designated terror group:

“Holder himself, using his influence as former deputy attorney general under the Clinton Administration, helped to negotiate Chiquita’s sweeheart deal with the Justice Department in the criminal case against Chiquita. Under this deal, no Chiquita official received any jail time. Indeed, the identity of the key officials involved in the assistance to the paramilitaries were kept under seal and confidential”

And the Department of Justice’s FBI strategy:

“The FBI is committed to sharing timely, relevant, and actionable intelligence with …. the private sector as part of its national security and law enforcement missions”

Do you suppose this preceding means sharing intelligence with corporations? I expect so. So does Bloomberg:

“Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency”

And if this were not enough, recalling the NSA is essentially a branch of the Pentagon, what should we all think of the ultimate bosses of the organization comprising what is essentially a hyper-right-wing ‘Christian Taliban‘ ?

Huh. It would seem Obama is covering up a LOT. How much? Obama’s end run on our constitution, allowing the Pentagon’s NSA to hand the USA gift-wrapped to organized corporate crime in the military-industrial complex is the tip of the iceberg folks:

Deep State I Foundation article

Deep State II FBI complicity

Deep State III Heroin, Bags of Cash & the CIA

In other words, you cannot believe a word this man (who has bragged concerning extra-judicial assassinations “I’m really good at killing people“) says in his speech on the NSA eavesdropping. Snowden is not the criminal. The criminal is the President of the United States. Imagine his saying (he does) “For more than two centuries, our Constitution has weathered every type of change because we have been willing to defend it” included in his most recent litany of lies:

28 January 2014 update: less than two weeks after Obama’s direction the USA no longer hold the bulk records of American citizens’ communications, this weasel has already ordered an end-run on his words (to mollify) the USA populace in regards to the constitution (why would anyone be surprised?)

Obama’s speech [egregious lies] of 17 January 2014

At the dawn of our Republic, a small, secret surveillance committee borne out of the “The Sons of Liberty” was established in Boston. The group’s members included Paul Revere, and at night they would patrol the streets, reporting back any signs that the British were preparing raids against America’s early Patriots.

Throughout American history, intelligence has helped secure our country and our freedoms. In the Civil War, Union balloon reconnaissance tracked the size of Confederate armies by counting the number of camp fires. In World War II, code-breaking gave us insight into Japanese war plans, and when Patton marched across Europe, intercepted communications helped save the lives of his troops. After the war, the rise of the Iron Curtain and nuclear weapons only increased the need for sustained intelligence-gathering. And so, in the early days of the Cold War, President Truman created the National Security Agency to give us insight into the Soviet bloc, and provide our leaders with information they needed to confront aggression and avert catastrophe.

Throughout this evolution, we benefited from both our Constitution and traditions of limited government. U.S. intelligence agencies were anchored in our system of checks and balances – with oversight from elected leaders, and protections for ordinary citizens. Meanwhile, totalitarian states like East Germany offered a cautionary tale of what could happen when vast, unchecked surveillance turned citizens into informers, and persecuted people for what they said in the privacy of their own homes.

In fact even the United States proved not to be immune to the abuse of surveillance. In the 1960s, government spied on civil rights leaders and critics of the Vietnam War. Partly in response to these revelations, additional laws were established in the 1970s to ensure that our intelligence capabilities could not be misused against our citizens. In the long, twilight struggle against Communism, we had been reminded that the very liberties that we sought to preserve could not be sacrificed at the altar of national security.

If the fall of the Soviet Union left America without a competing superpower, emerging threats from terrorist groups, and the proliferation of weapons of mass destruction placed new – and, in some ways more complicated – demands on our intelligence agencies. Globalization and the Internet made these threats more acute, as technology erased borders and empowered individuals to project great violence, as well as great good. Moreover, these new threats raised new legal and policy questions. For while few doubted the legitimacy of spying on hostile states, our framework of laws was not fully adapted to prevent terrorist attacks by individuals acting on their own, or acting in small, ideologically driven groups rather than on behalf of a foreign power.

The horror of September 11th brought these issues to the fore. Across the political spectrum, Americans recognized that we had to adapt to a world in which a bomb could be built in a basement, and our electric grid could be shut down by operators an ocean away. We were shaken by the signs we had missed leading up to the attacks – how the hijackers had made phone calls to known extremists, and travelled to suspicious places. So we demanded that our intelligence community improve its capabilities, and that law enforcement change practices to focus more on preventing attacks before they happen than prosecuting terrorists after an attack.

It is hard to overstate the transformation America’s intelligence community had to go through after 9/11. Our agencies suddenly needed to do far more than the traditional mission of monitoring hostile powers and gathering information for policymakers – instead, they were asked to identify and target plotters in some of the most remote parts of the world, and to anticipate the actions of networks that, by their very nature, cannot be easily penetrated with spies or informants.

And it is a testimony to the hard work and dedication of the men and women in our intelligence community that over the past decade, we made enormous strides in fulfilling this mission. Today, new capabilities allow intelligence agencies to track who a terrorist is in contact with, and follow the trail of his travel or funding. New laws allow information to be collected and shared more quickly between federal agencies, and state and local law enforcement. Relationships with foreign intelligence services have expanded, and our capacity to repel cyber-attacks has been strengthened. Taken together, these efforts have prevented multiple attacks and saved innocent lives – not just here in the United States, but around the globe as well.

And yet, in our rush to respond to very real and novel threats, the risks of government overreach – the possibility that we lose some of our core liberties in pursuit of security – became more pronounced. We saw, in the immediate aftermath of 9/11, our government engaged in enhanced interrogation techniques that contradicted our values. As a Senator, I was critical of several practices, such as warrantless wiretaps. And all too often new authorities were instituted without adequate public debate.

Through a combination of action by the courts, increased congressional oversight, and adjustments by the previous Administration, some of the worst excesses that emerged after 9/11 were curbed by the time I took office. But a variety of factors have continued to complicate America’s efforts to both defend our nation and uphold our civil liberties.

First, the same technological advances that allow U.S. intelligence agencies to pin-point an al Qaeda cell in Yemen or an email between two terrorists in the Sahel, also mean that many routine communications around the world are within our reach. At a time when more and more of our lives are digital, that prospect is disquieting for all of us.

Second, the combination of increased digital information and powerful supercomputers offers intelligence agencies the possibility of sifting through massive amounts of bulk data to identify patterns or pursue leads that may thwart impending threats. But the government collection and storage of such bulk data also creates a potential for abuse.

Third, the legal safeguards that restrict surveillance against U.S. persons without a warrant do not apply to foreign persons overseas. This is not unique to America; few, if any, spy agencies around the world constrain their activities beyond their own borders. And the whole point of intelligence is to obtain information that is not publicly available. But America’s capabilities are unique. And the power of new technologies means that there are fewer and fewer technical constraints on what we can do. That places a special obligation on us to ask tough questions about what we should do.

Finally, intelligence agencies cannot function without secrecy, which makes their work less subject to public debate. Yet there is an inevitable bias not only within the intelligence community, but among all who are responsible for national security, to collect more information about the world, not less. So in the absence of institutional requirements for regular debate – and oversight that is public, as well as private – the danger of government overreach becomes more acute. This is particularly true when surveillance technology and our reliance on digital information is evolving much faster than our laws.

For all these reasons, I maintained a healthy skepticism toward our surveillance programs after I became President. I ordered that our programs be reviewed by my national security team and our lawyers, and in some cases I ordered changes in how we did business. We increased oversight and auditing, including new structures aimed at compliance. Improved rules were proposed by the government and approved by the Foreign Intelligence Surveillance Court. And we sought to keep Congress continually updated on these activities.

What I did not do is stop these programs wholesale – not only because I felt that they made us more secure; but also because nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens.

To the contrary, in an extraordinarily difficult job, one in which actions are second-guessed, success is unreported, and failure can be catastrophic, the men and women of the intelligence community, including the NSA, consistently follow protocols designed to protect the privacy of ordinary people. They are not abusing authorities in order to listen to your private phone calls, or read your emails. When mistakes are made – which is inevitable in any large and complicated human enterprise – they correct those mistakes. Laboring in obscurity, often unable to discuss their work even with family and friends, they know that if another 9/11 or massive cyber-attack occurs, they will be asked, by Congress and the media, why they failed to connect the dots. What sustains those who work at NSA through all these pressures is the knowledge that their professionalism and dedication play a central role in the defense of our nation.

To say that our intelligence community follows the law, and is staffed by patriots, is not to suggest that I, or others in my Administration, felt complacent about the potential impact of these programs. Those of us who hold office in America have a responsibility to our Constitution, and while I was confident in the integrity of those in our intelligence community, it was clear to me in observing our intelligence operations on a regular basis that changes in our technological capabilities were raising new questions about the privacy safeguards currently in place. Moreover, after an extended review of our use of drones in the fight against terrorist networks, I believed a fresh examination of our surveillance programs was a necessary next step in our effort to get off the open ended war-footing that we have maintained since 9/11. For these reasons, I indicated in a speech at the National Defense University last May that we needed a more robust public discussion about the balance between security and liberty. What I did not know at the time is that within weeks of my speech, an avalanche of unauthorized disclosures would spark controversies at home and abroad that have continued to this day.

Given the fact of an open investigation, I’m not going to dwell on Mr. Snowden’s actions or motivations. I will say that our nation’s defense depends in part on the fidelity of those entrusted with our nation’s secrets. If any individual who objects to government policy can take it in their own hands to publicly disclose classified information, then we will never be able to keep our people safe, or conduct foreign policy. Moreover, the sensational way in which these disclosures have come out has often shed more heat than light, while revealing methods to our adversaries that could impact our operations in ways that we may not fully understand for years to come.

Regardless of how we got here, though, the task before us now is greater than simply repairing the damage done to our operations; or preventing more disclosures from taking place in the future. Instead, we have to make some important decisions about how to protect ourselves and sustain our leadership in the world, while upholding the civil liberties and privacy protections that our ideals – and our Constitution – require. We need to do so not only because it is right, but because the challenges posed by threats like terrorism, proliferation, and cyber-attacks are not going away any time soon, and for our intelligence community to be effective over the long haul, we must maintain the trust of the American people, and people around the world.

This effort will not be completed overnight, and given the pace of technological change, we shouldn’t expect this to be the last time America has this debate. But I want the American people to know that the work has begun. Over the last six months, I created an outside Review Group on Intelligence and Communications Technologies to make recommendations for reform. I’ve consulted with the Privacy and Civil Liberties Oversight Board. I’ve listened to foreign partners, privacy advocates, and industry leaders. My Administration has spent countless hours considering how to approach intelligence in this era of diffuse threats and technological revolution. And before outlining specific changes that I have ordered, let me make a few broad observations that have emerged from this process.

First, everyone who has looked at these problems, including skeptics of existing programs, recognizes that we have real enemies and threats, and that intelligence serves a vital role in confronting them. We cannot prevent terrorist attacks or cyber-threats without some capability to penetrate digital communications – whether it’s to unravel a terrorist plot; to intercept malware that targets a stock exchange; to make sure air traffic control systems are not compromised; or to ensure that hackers do not empty your bank accounts.

Moreover, we cannot unilaterally disarm our intelligence agencies. There is a reason why blackberries and I-Phones are not allowed in the White House Situation Room. We know that the intelligence services of other countries – including some who feign surprise over the Snowden disclosures – are constantly probing our government and private sector networks, and accelerating programs to listen to our conversations, intercept our emails, or compromise our systems. Meanwhile, a number of countries, including some who have loudly criticized the NSA, privately acknowledge that America has special responsibilities as the world’s only superpower; that our intelligence capabilities are critical to meeting these responsibilities; and that they themselves have relied on the information we obtain to protect their own people.

Second, just as ardent civil libertarians recognize the need for robust intelligence capabilities, those with responsibilities for our national security readily acknowledge the potential for abuse as intelligence capabilities advance, and more and more private information is digitized. After all, the folks at NSA and other intelligence agencies are our neighbors and our friends. They have electronic bank and medical records like everyone else. They have kids on Facebook and Instagram, and they know, more than most of us, the vulnerabilities to privacy that exist in a world where transactions are recorded; emails and text messages are stored; and even our movements can be tracked through the GPS on our phones.

Third, there was a recognition by all who participated in these reviews that the challenges to our privacy do not come from government alone. Corporations of all shapes and sizes track what you buy, store and analyze our data, and use it for commercial purposes; that’s how those targeted ads pop up on your computer or smartphone. But all of us understand that the standards for government surveillance must be higher. Given the unique power of the state, it is not enough for leaders to say: trust us, we won’t abuse the data we collect. For history has too many examples when that trust has been breached. Our system of government is built on the premise that our liberty cannot depend on the good intentions of those in power; it depends upon the law to constrain those in power.

I make these observations to underscore that the basic values of most Americans when it comes to questions of surveillance and privacy converge far more than the crude characterizations that have emerged over the last several months. Those who are troubled by our existing programs are not interested in a repeat of 9/11, and those who defend these programs are not dismissive of civil liberties. The challenge is getting the details right, and that’s not simple. Indeed, during the course of our review, I have often reminded myself that I would not be where I am today were it not for the courage of dissidents, like Dr. King, who were spied on by their own government; as a President who looks at intelligence every morning, I also can’t help but be reminded that America must be vigilant in the face of threats.

Fortunately, by focusing on facts and specifics rather than speculation and hypotheticals, this review process has given me – and hopefully the American people – some clear direction for change. And today, I can announce a series of concrete and substantial reforms that my Administration intends to adopt administratively or will seek to codify with Congress.

First, I have approved a new presidential directive for our signals intelligence activities, at home and abroad. This guidance will strengthen executive branch oversight of our intelligence activities. It will ensure that we take into account our security requirements, but also our alliances; our trade and investment relationships, including the concerns of America’s companies; and our commitment to privacy and basic liberties. And we will review decisions about intelligence priorities and sensitive targets on an annual basis, so that our actions are regularly scrutinized by my senior national security team.

Second, we will reform programs and procedures in place to provide greater transparency to our surveillance activities, and fortify the safeguards that protect the privacy of U.S. persons. Since we began this review, including information being released today, we have declassified over 40 opinions and orders of the Foreign Intelligence Surveillance Court, which provides judicial review of some of our most sensitive intelligence activities – including the Section 702 program targeting foreign individuals overseas and the Section 215 telephone metadata program. Going forward, I am directing the Director of National Intelligence, in consultation with the Attorney General, to annually review – for the purpose of declassification – any future opinions of the Court with broad privacy implications, and to report to me and Congress on these efforts. To ensure that the Court hears a broader range of privacy perspectives, I am calling on Congress to authorize the establishment of a panel of advocates from outside government to provide an independent voice in significant cases before the Foreign Intelligence Surveillance Court.

Third, we will provide additional protections for activities conducted under Section 702, which allows the government to intercept the communications of foreign targets overseas who have information that’s important for our national security. Specifically, I am asking the Attorney General and DNI to institute reforms that place additional restrictions on government’s ability to retain, search, and use in criminal cases, communications between Americans and foreign citizens incidentally collected under Section 702.

Fourth, in investigating threats, the FBI also relies on National Security Letters, which can require companies to provide specific and limited information to the government without disclosing the orders to the subject of the investigation. These are cases in which it is important that the subject of the investigation, such as a possible terrorist or spy, isn’t tipped off. But we can – and should – be more transparent in how government uses this authority. I have therefore directed the Attorney General to amend how we use National Security Letters so this secrecy will not be indefinite, and will terminate within a fixed time unless the government demonstrates a real need for further secrecy. We will also enable communications providers to make public more information than ever before about the orders they have received to provide data to the government.

This brings me to program that has generated the most controversy these past few months – the bulk collection of telephone records under Section 215. Let me repeat what I said when this story first broke – this program does not involve the content of phone calls, or the names of people making calls. Instead, it provides a record of phone numbers and the times and lengths of calls – meta-data that can be queried if and when we have a reasonable suspicion that a particular number is linked to a terrorist organization.

Why is this necessary? The program grew out of a desire to address a gap identified after 9/11. One of the 9/11 hijackers – Khalid al-Mihdhar – made a phone call from San Diego to a known al Qaeda safe-house in Yemen. NSA saw that call, but could not see that it was coming from an individual already in the United States. The telephone metadata program under Section 215 was designed to map the communications of terrorists, so we can see who they may be in contact with as quickly as possible. This capability could also prove valuable in a crisis. For example, if a bomb goes off in one of our cities and law enforcement is racing to determine whether a network is poised to conduct additional attacks, time is of the essence. Being able to quickly review telephone connections to assess whether a network exists is critical to that effort.

In sum, the program does not involve the NSA examining the phone records of ordinary Americans. Rather, it consolidates these records into a database that the government can query if it has a specific lead – phone records that the companies already retain for business purposes. The Review Group turned up no indication that this database has been intentionally abused. And I believe it is important that the capability that this program is designed to meet is preserved.

Having said that, I believe critics are right to point out that without proper safeguards, this type of program could be used to yield more information about our private lives, and open the door to more intrusive, bulk collection programs. They also rightly point out that although the telephone bulk collection program was subject to oversight by the Foreign Intelligence Surveillance Court and has been reauthorized repeatedly by Congress, it has never been subject to vigorous public debate.

For all these reasons, I believe we need a new approach. I am therefore ordering a transition that will end the Section 215 bulk metadata program as it currently exists, and establish a mechanism that preserves the capabilities we need without the government holding this bulk meta-data.

This will not be simple. The Review Group recommended that our current approach be replaced by one in which the providers or a third party retain the bulk records, with the government accessing information as needed. Both of these options pose difficult problems. Relying solely on the records of multiple providers, for example, could require companies to alter their procedures in ways that raise new privacy concerns. On the other hand, any third party maintaining a single, consolidated data-base would be carrying out what is essentially a government function with more expense, more legal ambiguity, and a doubtful impact on public confidence that their privacy is being protected.

During the review process, some suggested that we may also be able to preserve the capabilities we need through a combination of existing authorities, better information sharing, and recent technological advances. But more work needs to be done to determine exactly how this system might work.

Because of the challenges involved, I’ve ordered that the transition away from the existing program will proceed in two steps. Effective immediately, we will only pursue phone calls that are two steps removed from a number associated with a terrorist organization instead of three. And I have directed the Attorney General to work with the Foreign Intelligence Surveillance Court so that during this transition period, the database can be queried only after a judicial finding, or in a true emergency.

Next, I have instructed the intelligence community and Attorney General to use this transition period to develop options for a new approach that can match the capabilities and fill the gaps that the Section 215 program was designed to address without the government holding this meta-data. They will report back to me with options for alternative approaches before the program comes up for reauthorization on March 28. During this period, I will consult with the relevant committees in Congress to seek their views, and then seek congressional authorization for the new program as needed.

The reforms I’m proposing today should give the American people greater confidence that their rights are being protected, even as our intelligence and law enforcement agencies maintain the tools they need to keep us safe. I recognize that there are additional issues that require further debate. For example, some who participated in our review, as well as some in Congress, would like to see more sweeping reforms to the use of National Security Letters, so that we have to go to a judge before issuing these requests. Here, I have concerns that we should not set a standard for terrorism investigations that is higher than those involved in investigating an ordinary crime. But I agree that greater oversight on the use of these letters may be appropriate, and am prepared to work with Congress on this issue. There are also those who would like to see different changes to the FISA court than the ones I have proposed. On all of these issues, I am open to working with Congress to ensure that we build a broad consensus for how to move forward, and am confident that we can shape an approach that meets our security needs while upholding the civil liberties of every American.

Let me now turn to the separate set of concerns that have been raised overseas, and focus on America’s approach to intelligence collection abroad. As I’ve indicated, the United States has unique responsibilities when it comes to intelligence collection. Our capabilities help protect not only our own nation, but our friends and allies as well. Our efforts will only be effective if ordinary citizens in other countries have confidence that the United States respects their privacy too. And the leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them, rather than turning to surveillance. In other words, just as we balance security and privacy at home, our global leadership demands that we balance our security requirements against our need to maintain trust and cooperation among people and leaders around the world.

For that reason, the new presidential directive that I have issued today will clearly prescribe what we do, and do not do, when it comes to our overseas surveillance. To begin with, the directive makes clear that the United States only uses signals intelligence for legitimate national security purposes, and not for the purpose of indiscriminately reviewing the emails or phone calls of ordinary people. I have also made it clear that the United States does not collect intelligence to suppress criticism or dissent, nor do we collect intelligence to disadvantage people on the basis of their ethnicity, race, gender, sexual orientation, or religious beliefs. And we do not collect intelligence to provide a competitive advantage to U.S. companies, or U.S. commercial sectors.

In terms of our bulk collection of signals intelligence, U.S. intelligence agencies will only use such data to meet specific security requirements: counter-intelligence; counter-terrorism; counter-proliferation; cyber-security; force protection for our troops and allies; and combating transnational crime, including sanctions evasion. Moreover, I have directed that we take the unprecedented step of extending certain protections that we have for the American people to people overseas. I have directed the DNI, in consultation with the Attorney General, to develop these safeguards, which will limit the duration that we can hold personal information, while also restricting the use of this information.

The bottom line is that people around the world – regardless of their nationality – should know that the United States is not spying on ordinary people who don’t threaten our national security, and that we take their privacy concerns into account. This applies to foreign leaders as well. Given the understandable attention that this issue has received, I have made clear to the intelligence community that – unless there is a compelling national security purpose – we will not monitor the communications of heads of state and government of our close friends and allies. And I’ve instructed my national security team, as well as the intelligence community, to work with foreign counterparts to deepen our coordination and cooperation in ways that rebuild trust going forward.

Now let me be clear: our intelligence agencies will continue to gather information about the intentions of governments – as opposed to ordinary citizens – around the world, in the same way that the intelligence services of every other nation does. We will not apologize simply because our services may be more effective. But heads of state and government with whom we work closely, and on whose cooperation we depend, should feel confident that we are treating them as real partners. The changes I’ve ordered do just that.

Finally, to make sure that we follow through on these reforms, I am making some important changes to how our government is organized. The State Department will designate a senior officer to coordinate our diplomacy on issues related to technology and signals intelligence. We will appoint a senior official at the White House to implement the new privacy safeguards that I have announced today. I will devote the resources to centralize and improve the process we use to handle foreign requests for legal assistance, keeping our high standards for privacy while helping foreign partners fight crime and terrorism.

I have also asked my Counselor, John Podesta, to lead a comprehensive review of big data and privacy. This group will consist of government officials who—along with the President’s Council of Advisors on Science and Technology—will reach out to privacy experts, technologists and business leaders, and look at how the challenges inherent in big data are being confronted by both the public and private sectors; whether we can forge international norms on how to manage this data; and how we can continue to promote the free flow of information in ways that are consistent with both privacy and security.

For ultimately, what’s at stake in this debate goes far beyond a few months of headlines, or passing tensions in our foreign policy. When you cut through the noise, what’s really at stake is how we remain true to who we are in a world that is remaking itself at dizzying speed. Whether it’s the ability of individuals to communicate ideas; to access information that would have once filled every great library in every country in the world; or to forge bonds with people on other sides of the globe, technology is remaking what is possible for individuals, for institutions, and for the international order. So while the reforms that I have announced will point us in a new direction, I am mindful that more work will be needed in the future.

One thing I’m certain of: this debate will make us stronger. And I also know that in this time of change, the United States of America will have to lead. It may seem sometimes that America is being held to a different standard, and the readiness of some to assume the worst motives by our government can be frustrating. No one expects China to have an open debate about their surveillance programs, or Russia to take the privacy concerns of citizens into account. But let us remember that we are held to a different standard precisely because we have been at the forefront in defending personal privacy and human dignity.

As the nation that developed the Internet, the world expects us to ensure that the digital revolution works as a tool for individual empowerment rather than government control. Having faced down the totalitarian dangers of fascism and communism, the world expects us to stand up for the principle that every person has the right to think and write and form relationships freely – because individual freedom is the wellspring of human progress.

Those values make us who we are. And because of the strength of our own democracy, we should not shy away from high expectations. For more than two centuries, our Constitution has weathered every type of change because we have been willing to defend it, and because we have been willing to question the actions that have been taken in its defense. Today is no different. Together, let us chart a way forward that secures the life of our nation, while preserving the liberties that make our nation worth fighting for. Thank you

^ None of what Obama has stated, can be believed

*