Archives for posts with tag: Daniel Ellsberg

“The idea of becoming “NSA-proof” is just silly. If they want it, they can get it” Joseph Lorenzo Hall

“I’m going to slip up and they’re going to hack me. It’s going to happen” Edward Snowden

All the encryption in the world isn’t going to protect, example given, a computer with a NSA, GCHQ, Unit 8200 or other intelligence agency’s undetectable keylog trojan, trust me. But first, a bit of my story and then onto how (not, actually) to leak:

When I’d exited the U.S. Army in April, 1976, I held a top secret clearance. The only documents I had taken with me were a complete record of my military 201 file. I also had (since) acquired copies of my veterans and social security files. How I’d managed copies of these are a secret, along the lines of Benjamin Franklin’s ‘three people can keep a secret if two of them are dead.’ In this regard, it is worth mentioning I have held information between my ears that has never been spoken of in presence of mobile device, let alone entered into a computer or sent via any email.

Ok, so I can tell how I acquired the social security file, the social security administration fucked up and mailed me my own file. Yes, the original, which I went through with what certain people might have assumed would be great satisfaction, as supposedly I realized I was the censor who’d decide what I could see in my file. Of course I redacted or with-held nothing in my self exam, prior to sending the file on to my attorney who notified the social security administration we were (supposedly) inadvertently in possession of the file and to who should we send it to? A lady at the administration, in subsequent conversation, commented to myself something along the lines of ‘NO ONE has had the access to their file that you have had…’

But in fact this social security business was patent bs. Almost certainly the file had been deliberately sent my way, stripped of certain records (they missed pulling one critical document pointing to this), to throw me off the trail of then senators Max Baucus and Conrad Burns who both were complicit in covering up crimes at United States Forest Service offices in Montana on environmental issues, and suspects in regards to my file having been sequestered for months at the Social Security offices in Maryland while it was investigated whether I could be charged with fraud. Why? The USA appears to have left no stone unturned in efforts to take myself out of the public circulation due to my anti-corruption work of that era (1990s.) Apart from this, it was about this time I’d produced copies of records from my VA (military veteran) file after certain originals had gone missing following an ‘expert’ sent from Washington to Helena (Montana, where my VA file was kept) to ‘review’ files, kept me from charges of fraud relating to my veteran’s disability pension.

This (failed) ‘deep state’ caper in regards to attempt at trumping up felony charges intended to send me to jail and end my work, follows typical false flag spy-craft model. The people hearing the case, had it been successfully pursued, would have been innocents looking at a record they could not know (or believe) had been tampered with, to secure a conviction. My having copies of my VA file documents, saved my butt. I produced the necessary copy of a critical document at the initial hearing and the case was dismissed on the spot.

It wasn’t until I’d dug into the USA’s funding of charter schools as cover for intelligence embeds, the agencies had begun playing hardball or, that is to say, devoted resources to taking me out physically (assassination.)

Prior to this, during my stint with Special Forces, I’d the best possible education in operations and intelligence because it was not school, but OJT (on-the-job-training) with veterans of operations coordinated with CIA in Indochina and Central America. This was the best (or worst, depending on one’s perspective) avenue to knowledge in the ‘game’ of international intrigue; it was unrestricted, first hand knowledge of the dirty aspect of the business on the ground, where the intrigues hatched by criminal minds at Langley, Virginia, are played out.  Suffice it to say, I departed Special Forces with a remarkable understanding of how underhanded the game of spies is played, the paramount importance of employing psychology to one’s advantage (in often devious ways), and the imperative necessity of the death of one’s conscience to be successful and survive. Having only learned about, not employed these nefarious skills, I took my conscience and ethics, intact, with me on departure, together with the remarkable tool kit I’d developed through this experience, in subsequent work as investigator. My favorite of these skills had been open source analysis, in fact in light of the avalanche of criticisms since the Snowden revelations, it has been pointed out CIA open source analysis has been more effective, by far, than any NSA program, in relation to spy-craft.

Now, applying old school spy-craft, to the point of this essay; how NOT to leak-

Since WikiLeaks had been locked out of its own leak platform we’ve had ‘OpenLeaks‘ (a flop) and since we’ve had the deceptive & falsely named, pandering to fools, so-called ‘SecureDrop‘ (remember Reality Winner?)

However ‘SecureDrop’ might have been well intended, I wouldn’t touch it with the proverbial ten-foot pole. What’s more is, I doubt you’d even need it, if you wished to leak. I’ll go into the why you wouldn’t need it first, and then why I wouldn’t touch it.

If you wished to have a secure platform to leak documented criminal activities from, as opposed to a supposedly ‘secure’ online platform to leak to, you should be able to build one yourself. And you shouldn’t need to be a computer guru to do it. The recipe is exceedingly simple:

Acquire a laptop that cannot be traced to you, from a yard sale in an unfamiliar neighborhood, example given. Park your car away from where you make the purchase. I don’t advise stealing a machine, but that’d work if you’re a competent thief and don’t leave a trail. We know the NSA has arranged to implant computers with bugged software, actual hardware in some cases, and we want a computer that it doesn’t matter if it ‘calls home’ (NSA) when certain red flags might be triggered by materials you might be handling, so onto the next paragraph.

Now, before you even fire the machine up for the first time, you kill the web-cam, a piece of paper taped over it will do just fine. And you disable the microphone and speaker with dummy jacks cut from discarded actual microphones and speakers and epoxy them in place, just to make certain they stay there. Carefully cut them off where the plug extends from the jack, so they are not obvious. Now your ‘leak platform’ is externally blind, deaf and dumb. Shut off bluetooth and search the machine for any GPS integrated software programs and disable them prior to logging on to the internet. DO NOT log into internet from your home.

Now, as to what you might be leaking, consider whether it will be tracked to you on the back-end (source.) Be assured in some environments there will be efforts to do certain things, like identify a computer that had items downloaded onto a memory stick. How will you get these materials safely into the machine you intend to leak from? Old fashioned spy-craft is something to consider, if you do not feel secure in the environment whose security you are breaching. Digital photos of actual documents can be loaded into the computer or paper documents can be scanned into your ‘leak platform’ (in which case you will want an older, untraceable scanner as well.) Use a digital camera that cannot be traced to you. You NEVER want to mail by post any documents, because certain addresses will be flagged by intelligence agencies and your package could be intercepted and might give up fingerprints and/or DNA and other information, such as a the postmark information needed to review security footage at specific locations on certain dates. Also, you’ll want clean paper documents for a scanner (particularly) or digital camera, on account of the possibility you might inadvertently scan your own or your colleagues fingerprints (use gloves when working with any paper documents.)

Ask yourself, is the material you are considering making public, of a demonstrable criminal nature? Or, does it shock the conscience in a sense of egregious violating principles of ethics? COVER YOUR ASS, BECAUSE NO MATTER THE PRECAUTIONS TAKEN, YOU MIGHT GET CAUGHT. Public opinion might save your butt, but don’t count on it, it hasn’t worked for many (if any in recent times.)

Remind yourself, there has been a dearth of leakers that have gone undetected. Has it ever crossed your mind why there has been no ‘deep throat‘ in our present era, and why it seems nearly everyone gets busted? As well, our Federalist Society majority on the USA’s ‘deep state’ owned (corporate board controlled) Supreme Court refused first amendment free press protection to journalism in the case of James Risen in a leaks case. They’ll be after you with everything at the system’s disposal and your chances are not good if you are detected at any level.

Now, you’ve decided, as a patriot, your leak is worth your liberty and/or life and you’ve convinced yourself you’ve stolen the material you wish  to leak without getting caught (let’s hope you’re right) and it’s time to deliver to the journalists, undetected. Perhaps you’d wish to wait three or six months, after you’ve gotten away with the initial theft, it’d be nice if the trail grows cold. Now, your documents are loaded into file that is easy to access, for instance located on the desktop. The email addresses you wish to send the information to are handy. Now, your platform, ‘Dr Leakey’ (named for the archaeologist), is ready. You are in familiar turf (if you are confident), or you have traveled to unfamiliar territory (if you have nerves of steel.) What you need is an open wireless signal you can log onto. When you’ve found this at a cafe or a truckstop or simply a careless person in any neighborhood with unlocked wireless where you can log in from, sitting in your car parked close by (beware of cctv), log on. Create a faked email account (that you will never use again.) Send a first mail (BCC to recipients) to yourself, explaining there is a second mail following with attachments and stating if the recipient does not see the second mail, to look in their spam folder. This mail should pop up and you see it with no failed addresses (from the BCC to the people you are mailing.) Seeing you have a working address on both ends (i.e. functioning mail accounts) and are you still determined to do this, ask yourself, for real? Deep breath, new mail addressed, attached file(s), hit send, have coffee, read the paper, look at ease, normal, belonging in your environment while the what might seem like ages in time pass as the file uploads from the computer and finally the mail goes ‘whoosh’ (in your mind) and the leak is done.

Calmly go on about your day and know how you will be disposing of Dr Leakey. You used him for this one project and will never use him again. Example given, pull out the ram, hard drive goes to the incinerator (an all night campfire will do), break the screen as though Dr Leakey had been accidentally dropped & parts salvaged, and the carcass destination ends in a dumpster (leave no fingerprints.) Same fate for either the digital camera or scanner, if you used these. Be patient for results in the news. You’ve just dropped a bomb from the unseen world and any journalist worth your while, will take time to try and authenticate the information you’ve provided. If they blow it off and never pursue the lead, maybe the gods actually love you. If you’ve gotten away with it, resist temptation to ever do it again. There might be such thing as a charmed life, but it’s probably not yours.

By now, the NSA with its billions of mails to look through, will come up with (at most) someone sent a mail from an account used ONCE, from an computer they never see log in again, over some unsecured random wireless signal in the greater Los Angeles metropolitan area, example given. Maybe you live in this area of 13 million people or maybe you don’t. This is because you left little in the way of digital fingerprints by finding a way around taking your leak out on a memory stick. Enjoy a quiet laugh and hope you were good enough getting the material out the back-end, with a cold or faint trail, because if you did it right,  they can’t track you from that end. And then erase your personal memory, the one between your ears, because you never wish to tell ANYONE, who you are, in relation to what you’ve done. Meanwhile, study technique along the lines set out by a former FBI agent in the article ‘Spy Craft for Hacks‘ but even there the deck is stacked against you with an ‘agency friendly’, very serious lie by omission; don’t ever have your cell phone (or any mobile device) along on what would then become a misadventure. You’ll need cold nerves, excellent understanding of the environment and good luck, to pull it off. Nothing suffices for this like training and even then, there is no absolute way of doing these things undetected. Luck and competence on your own part and that of your adversaries play into this as well.

Now, to why you probably don’t actually want or need to leak. Firstly, we know it is no longer a conspiracy ‘theory’ (rather conspiracy fact) the USA’s security state is behaving like nazis in relation to surveillance of its own people. We know it’s likely the corporate ‘deep state’ co-opted congress, president and courts are doing little and will do little or nothing to actually change this behavior of the MILITARY elements in control of the runaway NSA, other than at most, wring their hands for public consumption. You don’t need much more knowledge to effect change, if change is going to happen. And if change isn’t happening, what’s the point? If our society’s leading lights are merely content (at most) to shout and stamp their feet like spoiled children at what is going on, rather than shut down ‘business as usual’ along the lines of refusing this criminal hydra legitimacy and attending power, and you don’t see the tectonic plate shift in public outrage necessary to force the issue, there really is no point, people have been cowed into obedience along the lines predicted by both Orwell & Huxley. On the one hand you have Orwell’s conservative sheep bleating on behalf of the ‘security’ state over the terror propaganda all of our western world has been fed. On the other hand you have Huxley’s ‘it’s all about me’ MTV generation could care less about civil liberties beyond freedom to consume, extreme sport, sex, fashion and media ego. With corporate media feeding a public with an education one mile wide and one quarter inch deep (1.6 kilometers wide & 1/2 centimeter deep), the Billy Grahams and Hollywood (our two primary oracles of ‘god’) rule a society which has cannot be saved from itself, because you cannot get the majority’s attention long enough to explain a few sensible things that might change their focus, if not their beliefs, whether puritan or hedonistic. This reflects social engineering via media information operations.

Stepping into/out of this world in relation to spies and leaking is a very dangerous proposition for the untrained. Now is time to work with what we know, not obsess with pursing endless soap operas concerning information on criminals you exercise no real control over. And there is a reason intelligence will want you obsessing (keep reading.)

What can be clearly inferred from open source analysis is, our civil structures have become criminal, out of control, one could go so far as to simply state ‘insane.’ And this is what is distracted from, when obsessed with being outraged at the western democracies ‘voyeurism’ in relation to ‘the people’ who supposedly are in control of our future direction via the principle of ‘consent of the governed.’ The propagandists at the several corporate board controlled intelligence agencies, via co-opted western media, will work to guide and exploit this national tantrum to a (hopefully) calmed down child at the end of the day.

As to the ongoing criminal agendas, one only need look at Chevron (example given) as a corporate gangster poster child and how they’ve managed to buy congress and the courts via Federalist Society owned justices at the top, along the lines of ‘citizens united.’ As for the out of control, one only need look at how ineffective congressional oversight has been, and is presently, in regards to NSA, example given, and there is no change in sight. As for the insane, one only need look at the USA, and it’s lapdog western democracies, pushing Russia to the brink with geo-political capers recently best illustrated in Ukraine, and how western media lies to the public about what is actually going on. Left unchecked, this insanity will certainly lead to VERY BAD subsequent events.

Now, to alternative media and the so-called ‘progressive’ movement, here’s why I wouldn’t touch any online platform, despite examples such as the ‘indomitable’ Guardian subscribe to ‘SecureDrop.’

To begin with, directing leaks to electronics communications platforms is playing to the NSA’s strong point, this area of expertise is SIGINT (signals intelligence), the NSA forte. No matter the encryption expertise involved in any platform’s construction, it is an invitation to play in the lion’s den. Be assured, the NSA (not to mention GCHQ and other intelligence agencies) will assign crack teams to SecureDrop (if ‘securedrop’ were not actually designed by these.)

The Guardian (newspaper) is an organization that would be very deliberately targeted by HUMINT (human intelligence) as a matter of fact. Organizations wishing to penetrate, spy, shape dialogue & policy within the Guardian would include MOSSAD, CIA, DGSE (France) and the British intelligence agencies. Each of these agencies will have a vested interest in covert penetration of the Guardian on account of that paper not having been (yet) entirely monopolized by any one of the Western intelligence agencies (which squabble & compete among themselves.) Anything, were it sent through the pretense of a so-called secure system, is at risk of exposure to clandestine a rabbit warren designed by spies within the Guardian organization. Trust me, they’re there. MOSSAD particularly, would be interested in any information it could potentially acquire, as ‘chits’ to trade to the USA (and other nations) for political favors, as its political currency continues in steady decline over West Bank issues. Just because you possibly managed a ‘secure’ leak (in your dreams) over the SecureDrop system, does not mean you are secure, not by a long shot, because you cannot know how the material might be compromised after it has been put through, let alone whether the system itself is penetrated/designed to identify the source point of the upload and MOSSAD trades YOU in a quid pro quo with another agency.

And now to the odious (closing) aspect of this essay.

“You can imagine my surprise when I read the June 13, 1971, issue of the Sunday New York Times and saw there among the “Pentagon Papers” a number of basic information papers that had been in my own files in the Joint Chiefs of Staff area of the Pentagon. Most of the papers of that period had been source documents from which I had prepared dozens — even hundreds — of briefings, for all kinds of projects, to be given to top Pentagon officers. Not only had many of those papers been in my files, but I had either written many of them myself or had written certain of the source documents used by the men who did.

“Many people have been so concerned about what has been happening to our Government that they have dedicated themselves to investigating and exposing its evils. Unfortunately, a number of these writers have been dupes of those cleverer than they or with sinister reasons for concealing knowledge. They have written what they thought was the truth, only to find out (if they ever did find out) that they had been fed a lot of contrived cover stories and just plain hogwash

“In the hands of Allen Dulles, “secrecy” was simply a chameleon device to be used as he saw fit and to be applied to lesser men according to his schemes. It is quite fantastic to find people like Daniel Ellsberg being charged with leaking official secrets simply because the label on the piece of paper said “TOP SECRET,” when the substance of many of the words written on those same papers was patently untrue and no more than a cover story. Except for the fact that they were official “lies”, these papers had no basis in fact, and therefore no basis to be graded TOP SECRET or any other degree of classification

“Any reader of the “Pentagon Papers” should be warned that although they were commissioned on June 17, 1967, by the Secretary of Defense as “the history of United States involvement in Vietnam from World War II [Sept 2, 1945] to the present” [1968], they are unreliable, inaccurate and marred by serious omissions. They are a contrived history, at best, even though they were written by a selected Task Force under Pentagon leadership” -Pentagon liaison to the CIA, L. Fletcher Prouty

In fact the so-called ‘Pentagon Papers’ were intended to deflect attention from the CIA and onto the military, concerning policy failures in Vietnam.

Open source analysis profiles (STRONGLY) Daniel Ellsberg as an intelligence agency officer, almost certainly CIA. What the CIA edits at wikipedia doesn’t inform of, when the public is fed

“Ellsberg served in the Pentagon from August 1964 under Secretary of Defense Robert McNamara (and, in fact, was on duty on the evening of the Gulf of Tonkin incident, reporting the incident to McNamara). He then served for two years in Vietnam working for General Edward Lansdale as a civilian in the State Department”

…is Ellsberg’s work for Edward Lansdale at Department of State has CIA information operations written all over it. One of CIA’s big tasks is information operations or social engineering via psychological manipulation of entire populations. And Ellsberg was working with one of the CIA’s true big shots in this area of intelligence expertise. The ultimate purpose of the ‘Pentagon Papers’ leak was information operations (social engineering) to shield the CIA from public accountability for the massive intelligence & related policy failures in Vietnam; by shifting public focus onto the Pentagon. The CIA was expendable and could have been disbanded. The Pentagon could not be done away with.

“That I had written parts of some of them proves that they were not genuine Pentagon papers, because my work at that time was devoted to support of the CIA” -L Fletcher Prouty

Colonel Prouty blew the whistle on the CIA & Ellsberg over 40 years ago. Colonel Prouty’s work, which has borne the test of time, is buried, meanwhile, whistle-blower ‘legend’ Ellsberg invites leakers into the SecureDrop cobra’s lair… as you actually believe the initial SecureDrop developer, Aaron Schwartz, hanged himself (and his co-developer’ ‘died’ after that.) Probably, it’s a case of, examples given, Gary Webb shot himself in the head TWICE (Superman could do that.) It’s an old model, for instance when Eli Black had stepped into longtime CIA turf at United Fruit, he was framed with an SEC investigation and a subsequently ‘depressed’ Eli broke an industrial strength skyscraper window with his briefcase and ‘jumped’ 44 floors from his office building. No-no, the CIA liaised generals at NSA won’t be allowing certain activities to move forward unimpeded. The only question with ‘SecureDrop’ is, how it has been compromised (since inception or when the source code was stolen, likely about the time Schwartz ‘hanged’ himself.)

Daniel Ellsberg has been a champion of WikiLeaks which has employed SecureDrop via tor (tor is a USA military intelligence tool.)

Ellsberg has promoted SecureDrop for Exposefacts.org.

Has it ever occurred to anyone, as to why, no one has ever outed a ‘Kim Philby‘ type character embedded in the progressive and peace movements, as though intelligence operatives would never caper within that playground? I’ll name you one. Daniel Ellsberg.

“From the beginning, the Pentagon Papers were a compilation of documents designed to paint President John F. Kennedy as the villain of the story, and to shield the role of the CIA” L Fletcher Prouty

Meanwhile, so-called ‘SecureDrop’ has been leaking the leakers identities for years.

 

This is a majorly rewritten, updated & re-titled piece from 2014 –

 

related at this site:

Pentagon Papers, CIA and the Lies of Daniel Ellsberg

The Smelly Side of Wikileaks

The NSA’s Egregious Liar: Why This Definition Should Matter

further reading:

[1] https://hiddenhistorycenter.org/colonel-l-fletcher-prouty-on-the-pentagon-papers/

[2] https://www.archives.gov/research/pentagon-papers

[3] https://ratical.org/ratville/JFK/ST/

[4] https://unredacted.com/2014/01/17/the-top-10-surveillance-lies-edward-snowdens-leaks-shed-heat-and-light-on/

 

*

 

A former Sergeant of Operations and Intelligence for Special Forces, Ronald Thomas West is a retired investigator (living in exile) whose work focus had been anti-corruption. Ronald had lived over thirty years in close association with Blackfeet Indians (those who still speak their language), and is published in international law as a layman: The Right of Self- Determination of Peoples and It’s Application to Indigenous People in The USA or The Mueller-Wilson Report, co-authored with Dr Mark D Cole. Ronald has been adjunct professor of American Constitutional Law at Johannes Gutenberg University, Mainz, Germany (for English credit, summer semester 2008.) Ronald’s formal educational background (no degree) is social psychology. His therapeutic device is satire.

Contact: penucquemspeaks@googlemail.com

“Non-cooperation with evil is as much a duty as cooperation with the good” -Mahatma Ghandi

A Sociopaths & Democracy Project

All original work and art © copyright by Ronald Thomas West; for profit and mass paper media redistribution prohibited

 

 

spyVspy

A ‘spy vs spy’ episode

Deep State Series, part eight

“Nobody on the left questions Ellsberg about these things”Doug Valentine

“From the beginning, the Pentagon Papers were a compilation of documents designed to paint President John F. Kennedy as the villain of the story, and to shield the role of the CIA” L Fletcher Prouty

There is a CIA liaised Ford Foundation funded, Nation Institute project ‘Tom Dispatch’ 7,800 word excuse for an article or example of how the Daniel Ellsberg propaganda myth of the left never seems to run out of traction. The lame premise of ‘the forgotten whistleblower’ is to prostitute the legacy of a dead man, Rand Corporation’s Anthony Russo, whilst in actuality reinforcing a lie of 40 plus years: Ellsberg’s disingenuous rationale for ‘leaking’ The Pentagon Papers. It is amazing to me that CIA cover story apologists are still working an Indochina information operations project forty plus years after the fact. But on second sight, this makes perfect sense. If the ‘Myth of Daniel Ellsberg’ were ever to unravel, so would the decades of CIA misinformation on a whole  plethora of cover stories (official lies) perpetrated on the American public.

Douglas Valentine, who for years investigated the CIA’s ‘Phoenix Program’ in Vietnam, and more, interviewing Indochina clandestine operations veterans who were on location, in that era, in 2003 penned an article; ‘Will The Real Daniel Ellsberg Please Stand Up?’

“The House of Representatives launched deeper probes into CIA drug smuggling and the CIA’s Phoenix Program in early 1971, and, naturally, the CIA at this critical time took extensive countermeasures in a concerted effort to conceal these facts. What is relevant … is that in June 1971, Daniel Ellsberg leaked the aptly named Pentagon Papers, shifting blame for the increasingly unpopular Vietnam War from the CIA to the military, while distracting public attention from the investigations of the CIA’s Phoenix Program and the CIA’s involvement in drug smuggling”

The article is worth a read. I witnessed CIA delivery of heroin to the United States Army at Vung Tau, Vietnam, in 1971. There is no ‘conspiracy theory’ involved with CIA international narcotics trafficking, only the actual conspiracies that have been and continue to be carried out. Ellsberg’s denials concerning any knowledge of, or connections to this trade, even as he is established to have been moving among and interacting with its principal players, is a red flag that should have warned people off embracing anything this career CIA disinformation specialist (and mole in the left) has ever asserted.

Ten years after Valentine had published his Ellsberg article in 2003, James Corbett spent nearly an hour in discussion with Valentine on the very same, developing a larger body of information for radio you can listen to HERE.

If he [Ellsberg] would keep these incredibly important two years of his life secret, he would have no problem keeping other, more important secrets” -Douglas Valentine

The first question Valentine raises in his radio interview is, when Ellsberg wrote his autobiography aptly named “Secrets”, why did he keep major portions of his story ‘secret’? Ellsberg’s connections to the heroin trade’s principal players, the fact he’d been in liaison with the CIA covert war (separate to the regular military) bosses and was plugged into the highest levels of the Indochina covert operations scene, as his work assignment. Related to this, Ellsberg had taken on covert operations assignments in Saigon for the CIA chief of station. One of Ellsberg’s colleagues of that era then drops the bombshell he was the one who’d passed along instruction for Ellsberg to release the Pentagon Papers. This person is a contact Valentine had been sent to by former CIA Director and one time CIA Vietnam ‘dirty war’ (Phoenix Program) boss William Colby, who incidently (1996) almost certainly was murdered for having been too free with giving up the agency’s dirty laundry. Moreover, it is credibly alleged William Colby himself had sent on the instruction for the Pentagon Papers release. Finally, the question is raised, why is Ellsberg still associating with those very CIA people he worked with in Vietnam (he avoids talking about in his autobiography), decades after the fact?

Valentine’s research matches the entirely independent (and highly suppressed) material in the exposé of a former Pentagon liaison to the CIA, ‘The Secret Team‘, by Colonel L. Fletcher Prouty. The reasons given for the Pentagon Papers release, by both Valentine and Prouty, is to shift any scrutiny and public attention away from the CIA and its activities in Vietnam; inclusive of narcotics trafficking & dirty war assassinations (Valentine’s focus) and how clandestine CIA policies were implemented to the detriment of the USA national interest (Prouty’s focus.)

It was Colonel L Fletcher Prouty first blew the whistle, over forty years ago, on Daniel Ellsberg as at the center of a CIA information operation (PSYOP) to shift responsibility for the immense policy failures of Vietnam from the CIA onto the Pentagon, the full chapter of what follows can be read online HERE

We have been saying that the release of the Pentagon Papers by the former CIA agent and long-time associate of Edward G. Lansdale, Daniel Ellsberg, may have been the opening attack by the CIA to cover its disengagement not only from the physical conflict in Indochina, but also from the historical record of that disastrous event. In this effort, the CIA appears to be trying to hide behind its own best cover story, that it is only an intelligence agency and that its fine intelligence work during the past twenty years on the subject of Southeast Asia is all that we should remember.

Now we find in Cooper [Chester Cooper, career resume HERE] another CIA apologist using the Foreign Affairs review to follow up and to praise Ellsberg. In fact, Cooper’s exhilaration in his task gets the better of him when he says, “Thanks to Daniel Ellsberg …” he means it! This near-endorsement of Ellsberg by a CIA writer in the publication of the Council on Foreign Relations is all the more significant when one learns that this Council is supported by foundations which are in turn directed by men from the Bechtel Corporation, Chase Manhattan Bank, Cummins Engine, Corning Glass, Kimberly-Clark, Monsanto Chemical, and dozens of others. Not long ago, the political scientist Lester Milbraith noted that “the Council on Foreign Relations, while not financed by government, works so closely with it that it is difficult to distinguish Council actions stimulated by government from autonomous actions.” And while we appreciate that Foreign Affairs states clearly that “It does not accept responsibility for the views expressed in any articles, signed or unsigned, which appear on [its] pages”, its record and especially its list of authors over the years, from John Foster Dulles in its first issue, speaks for itself.

This whole plot thickens to the point of near-hypocrisy when Cooper cites the August 3, 1954, National Intelligence Estimate. The same Pentagon Paper from which he quotes also contains a report on the year-long activity of the Saigon Military Mission. This report, written by Edward G. Lansdale of the CIA, began in that same month of August 1954. While the NIE was speaking disparagingly of Ngo Dunh Diem, the SMM was supporting the Diem regime during the days after the French defeat at Dien Bien Phu. This team and all of its efforts were CIA originated, CIA supported, CIA manned, and CIA directed. From 1954 through 1963, all American activity in Vietnam was dominated by the CIA. Although Lansdale and his key men, such as Charles Bohanon, Lucien Conein (the U.S. go between at the time of the Diem coup d’état), Bill Rosson, Arthur Arundel, Rufus Phillips, and others were listed in the Pentagon Papers with military rank, they were all in the employ of the CIA and were operating as CIA agents.

This is what the Pentagon Papers reveal as happening in 1954 and 1955. Now the CIA would have us believe that it was an objective and blameless intelligence agency all through those horrible years of the Vietnam build-up. However, it was the CIA that hid behind its own cover and that of State and Defense to fan the flames of a smoldering conflict. To add insult to injury, the CIA would have us believe that Eisenhower’s Secretary of State, John Foster Dulles, the DOD, Lyndon B. Johnson, and Richard M. Nixon were all to blame because they would not read and heed their NIE. Where were the CIA officials of the clandestine sector when their own men were writing these National Intelligence Estimates?

The big question is, If the National Estimates produced by the intelligence side of the CIA were so good, then why didn’t the men in the clandestine operations office read and follow the advice of their own estimates? Yes, the CIA likes to write about itself, and the CIA likes to have others write about it, as long as what they write is laudatory and skillful propaganda.

How can the CIA rationalize the fact that at the very same time it was sending its most powerful and experienced team of agents into action in Indochina, after its successes with Magsaysay in the Philippines, it was writing NIE for the President saying exactly the opposite? It is alarming enough today to put the Ellsberg releases and the Cooper tales together, but what did the CIA have in mind in 1954 when it was doing such disparate things? What did the CIA expect President Eisenhower and John Foster Dulles to believe: The NIE that said we couldn’t win with the “frail Diem regime”, or the SMM clandestine operation that was designed to support the same Diem regime? Or could it have been that they either did not know about the secret operation or were improperly briefed? This is the very heart of the matter. This is what this book is all about.

To put this in another context, when Eisenhower was planning for the ultimate summit meeting in May 1960, did the NIE say that all was going well and nothing should be done to upset the chances of success of that most important mission; and did the DD/P come in with his briefing for the U-2 flight at the same time? Or perhaps was there an NIE and no briefing about the U-2? How did the ST handle that one?

Or to carry this same theme over to early 1961, did the NIE correctly foretell that the Cubans would not rise up and support an invasion of so few troops without United States troops and air cover; and how did the DD/P brief the secret operation to President Kennedy to perform an invasion operation that was patently diametrically opposed to the NIE?

To drive home the point of this duality farther, Cooper states: “In November 1961, shortly after General Taylor and Walt Rostow returned from their trip to Vietnam recommending, inter alia, that the U.S. ‘offer to introduce into South Vietnam a military task force’, an NlE warned that any escalation of American military activity in Vietnam would be matched by similar escalation by Hanoi … the North Vietnamese would respond to an increased U.S. commitment with an offsetting increase in infiltrated support for the Viet Cong.”

Again the Intelligence Directorate of the CIA plays the lily white role. At about the same time, July 1961, the Pentagon Papers show that a report, again by Edward C. Lansdale, at that time a brigadier general assigned to McNamara’s staff and still, as ever, a strong supporter of the CIA, lists the very considerable amount of unconventional warfare resources in Southeast Asia, which were supported by and operating under the CIA. These military and paramilitary forces added into the tens of thousands of armed men and were liberally supported by American men, American money, and American equipment, all put in place under the direction of the CIA. The Deputy Director of Central Intelligence, General Cabell, had just ordered the ClA-operated United States Marine Corps helicopter squadron from Laos, where things had turned from bad to worse, into South Vietnam, where things were going to turn from bad to worse. They were flown into the Camau Peninsula by Americans, and they were supported by Americans for the purpose of airlifting the Special Forces Elite troops of Ngo Dinh Nhu for action against the citizens of that terrorized area. This was another example of what was going on in the covert field at the same time that Intelligence was putting out an Estimate to the contrary. We have Cooper to thank for the “nice” story and Ellsberg to thank for the “not-so-nice” story. Who was President Kennedy to believe — the man who came in with the NIE, or the man who came in to brief him about the tremendous clandestine and paramilitary operations? Or did they tell the President about both?

Today, the CIA would like us to believe that it had challenged the validity of the hallowed Domino Theory by advising Lyndon B. Johnson that, with the possible exception of Cambodia, it is likely that no nation in the area would quickly succumb to Communism as a result of the fall of Laos and South Vietnam. Furthermore, a continuation of the spread of Communism in the area would not be irreparable.

In 1961, the same time as this quote, Maxwell Taylor, the White House spokesman of the clandestine side of the CIA, informed President Kennedy that “the fall of South Vietnam to Communism would lead to the fairly rapid extension of Communist control, or complete accommodation to Communism, in the rest of the mainland of South East Asia and in Indonesia. The strategic implications worldwide, particularly in the Orient, would be extremely serious.” In those days, Maxwell Taylor expressed more properly the views of the CIA (DD/P) than those of the DOD where he was held in awe and suspicion after his return from retirement to become a member of the Kennedy “inside” staff.

General Taylor continued to espouse this view even after he moved to the Pentagon as chairman of the Joint Chiefs of Staff. On January 22, 1964, in a memo to Secretary of Defense Robert S. McNamara, he said, “A loss of South Vietnam to the Communists will presage an early erosion of the remainder of our position in that subcontinent.” Even though he had moved to the Pentagon, Taylor’s memoranda on South Vietnam were written by the Special Assistant for Counterinsurgency and Special Activity, an office within the confines of the Pentagon, but an office that had been created to work with the CIA, and which by that date had become a regular conduit for CIA thought and action.

Then, McNamara picked up this same “party line” in his memo to President Johnson (at that time his memoranda on this subject were written either by Lansdale or Bill Bundy, both CIA men) of March 16, 1967 “… Southeast Asia will probably fall under Communist dominance, all of Vietnam, Laos and Cambodia … Burma … Indonesia … Malaysia … Thailand … Philippines … India … Australia … New Zealand … Taiwan … Korea and Japan ….” By now, everyone was putting all pressure possible on Johnson, and as noted, they used all of the dominoes. Yet the CIA today would have us believe they were only the voice of the DD/I and not the DD/P speaking, through SACSA, to Maxwell Taylor, thence to McNamara, with input from Bundy and Lansdale, and on to Rusk and Johnson. No wonder the CIA wants men like Cooper and Ellsberg writing for them.

The final irony is discovered when the Cooper story begins to pit the National Estimates against other Ellsberg data in 1964-1965. He states that the NIE of late 1964 claimed that, ” . . . we do not believe that such actions [against the North] would have crucial effect in the daily lives of the overwhelming majority of the North Vietnamese population. We do not believe that attacks on industrial targets would so exacerbate current economic difficulties as to create unmanageable control problems [for the Hanoi regime] … would probably be willing to suffer some damage to the country in the course of a test of wills with the U.S. over the course of events in South Vietnam.” Then, as if to place the blame on the military, he adds, “As the Pentagon historians note, this view had little influence on the contingency papers which emerged.”

The most remarkable thing about this paragraph from Foreign Affairs is that it is directly the opposite of the views presented in the Pentagon Papers as the “William Bundy memo” on “Actions Available to the United States after Tonkin”, which is dated August 11, 1964. Bill Bundy was at that time no longer sitting in the Pentagon; he was working for the ST as Assistant Secretary of State for Far Eastern Affairs. However, overriding that position, Bill Bundy was always the ready spokesman and puppet, in both the Kennedy and Johnson Administrations, for the CIA. He had been with the CIA for ten years, was the son-in-law of Dean Acheson, and has been reported, as of this writing, to be in line for the position of editor of Foreign Affairs.

In this utterly fantastic memo, CIA spokesman Bill Bundy listed pages of “dirty tricks” and increasing pressures that were to be brought to bear against Hanoi, including the Rostow favorite, “tit for tat” actions. By late 1964, military escalation had begun, and the role of the CIA did not diminish — it was just overshadowed by the greater military magnitude. The flames that the CIA and the greater ST had ignited were faced by the military. However, even this huge force was never able to snuff them out; it just had to stand there and let them burn themselves out.

Then the Cooper account presents Dr. Sherman Kent, the long-time chief of the Board of National Estimates saying: “The nature of our calling requires that we pretend as hard as we are able that the wish is indeed the fact and that the policy-maker will invariably defer to our findings …” He feels that his associates’ concern about their influence is misplaced: “… no matter what we tell the policymaker, and no matter how right we are and how convincing, he will upon occasion disregard the thrust of our findings for reasons beyond our ken. If influence cannot be our goal, what should it be? … It should be to be relevant within the area of your competence, and above all it should be to be credible.”

Sherman Kent is an old pro. He knows his business and is one of the very best in his field; but how strange the context of this Foreign Affairs essay must seem to him. While he did prepare these NIE, his own associates in clandestine operations and his own boss, the DCI, were fanning out all over Southeast Asia under the cover of his professional expertise, not only oblivious and unheeding of his work, but making mockery of it. Such are the ways of the ST.

When a National Estimate is presented by the same house that presents the collateral and usually opposite view of Special Operations, the Agency pulls the rug from under the feet of its own best achievements and the men responsible for them. Allen Dulles was wrong when he wrote in 1948, along with Jackson and Correa, that the two broad functions of Intelligence and Special Operations should be under the same man and in the same agency. There is nothing wrong with the NIE system and with men like Sherman Kent, Ray Cline, and Bob Amory. The evil is on the other side; and in spite of the vigorous efforts of Agency zealots, who have attempted to rewrite the history of the past quarter-century, we cannot but take some faith in those words of Saint John, that Allen Dulles chose for the entrance way of the new CIA building: “The truth shall make you free.” This attempt to warp the truth will not.

It might also have been well if the Agency and its disciples had reconsidered their own “more appropriate choice” for a motto: “Look before you leap.” The American public and the world for which Arnold Toynbee speaks, prefer Truth.

*

Deep State I Background

Deep State II FBI complicity

Deep State III CIA narcotics trafficking

Deep State IV NATO & Gladio

Deep State V Economics & counter-insurgency

Deep State VI Opus Dei & Christian Dominion

Deep State VII The Coe Cult & ‘The Donald’ Election Scam

GLADIO

Profits of War The Israeli connection

Fear of Minor Debris On 9/11

The Alpha Chronology my narrative as a Deep State survivor

 

The extra-constitutional order born out of the National Security Act of 1947 is when the American state finally went completely off the rails in regards to the rule of law. This is when corporations became welded to the new ‘national security state’, undermining the constitutional order so completely, the rise and entrenchment of an unaccountable shadow government was inevitable:

http://now.tufts.edu/articles/shadow-government

What few people understand within and without the USA is the composition of this dark entity. There are competing factions represented in two larger camps of neo-liberal and neo-conservative, where there is a power struggle. Both camps are criminal actors relating to there is a fusion of corporate board policy to every department of government at every level, not least intelligence agencies with actors with broad capacity to act independently of any legitimate oversight. Within this hidden framework, endless deceits and subversion play out, with each side seeking to undermine the other. A leech fastened to this sick animal is the Israeli Zionist element in the USA, AIPAC, propped up by a much larger and more powerful Christian Zionist element consisting of a messianic ‘Christian millennial’ social phenomena whose beliefs system is quite openly and honestly laid out by the apocalyptic, neo-conservative author Tim LeHay:

https://en.wikipedia.org/wiki/Left_Behind

^ People who actually believe in this stuff are in control of the Pentagon, and also make up a disproportionate of the United States military officer corps and it is the Air Force (where the majority of the USA’s nuclear stockpiles are kept in custody) is the most thoroughly infected. These are the people with the upper hand:

This stuff isn’t touched by the left’s ‘alternative mainstream media’ and the neo-conservative outlets on the right posing as alternative media (e.g. The Daily Beast) of course will never dig into the criminality of their own players. Why doesn’t the left touch it? Probably because of several factors; 1) there is a lot of overlap between the camps, the two cooperate in crime having to do with areas of mutual interest, you can’t dig into one without stumbling across complicity of the other 2) plain old narcissism leading to a blinding denial, for instance the American left’s inability to honestly examine the relationship of Daniel Ellsberg to Edward Lansdale because it would shake the foundation of their political mythology and open other (practically religious) icons Julian Assange, Ray McGovern, Robert Parry, et al, to serious question and examination 3) leading to obvious next assumption; the American left is so thoroughly compromised by intelligence assets, witting and unwitting, they’ve been effectively castrated:

http://www.counterpunch.org/2003/03/08/will-the-real-daniel-ellsberg-please-stand-up/

With the several preceding (named) players consistently steering people’s attention away from the real danger zones, the apocalyptic-messianic, Christian millennial neo-conservative camp has all but won. In other words, we could call the composite circumstance an upcoming, messianic ‘Armageddon 4 U’ (whether you like the facts or not)

Mephisto

A Mephisto assessment of reality

An updated version of this (now deleted) article may be read HERE

 

*

In the Tom Englehardt interview with Laura Poitras (Snowden documentary film-maker) wondering if, in relation to the security state…

“the goal that they proclaim is not the goal”

…is the most astute and least explored observation in not only the interview, but the least explored phenomena of the entire security state. The usurping of our constitution and rule of law is not about fighting terror and fighting terror is in fact a purposeful avenue to coup de état. The same purpose is served with NATO aggression with pretext of Ukraine. A social tension to a degree where military is justified to make policy (we already see this) is avenue to suspension of habeas corpus.

Where Poitras has missed the boat and is to a great extent misled, is also where professional intelligence information operations will spend high $ and go into hyper-drive/overtime to shape the public discourse away from the deep state goal. That strategy can include deliberate leaks accompanied by persecution/prosecution to draw attention to the Mannings & Assanges of this world, to keep the focus of personalities like Poitras off the mark. Katrina vanden Heuval, in her ‘The Nation’ interview with Snowden, brought up a ‘deep state’ concept which Snowden acknowledged but the subject was as quickly dropped. Why? Because they’ve no idea where that trail leads to?

So long as the focus can kept be on personalities revealing facts but not leading to motive, and individual acts & information that distract from an internal ‘deep state’ are the obsession, the perpetrators within a security state’s concealed agenda will be winning. In this scenario, if Snowden was unforeseen, Assange has been a tool where the man is the issue, as much as what he has released doesn’t touch where the internal threat of the security state issues from. This becomes a distraction and creates numerous rabbit trails obscuring the source of the malevolent security state behaviors. Poitras and her ilk on the left hasn’t seen through this.

One reason for Poitras and the left’s myopia is embrace of a political mythology. When your archetype myth is challenged, there is a visceral rejection of evidence that is staring one in the face. In fact Pentagon liaison to the CIA, L. Fletcher Prouty, a man who would be in position to know without a doubt as one of the authors of the so-called Pentagon Papers, long ago fingered Daniel Ellsberg as at the center of a deliberately engineered (by the security state) leak meant to shift responsibility for the failures of Vietnam policy from the CIA to the military. Ellsberg is a keystone of the deep state disinformation campaign on the left; the people who’ve built information that tend to support Colonel Prouty’s revelation (not a hypothesis) are on the center right and better positioned to know where the deep state derives from (the right.)

The Military Religious Freedom Foundation is one such organization. Presided over by a Reagan White House attorney, Mikey Weinstein, there is no one better positioned to point to a hyper-right-wing Christian religious coup at the Pentagon. Colonel Prouty, an old line conservative, had labeled this deep state cult ‘The Secret Team’ and described it as a “new religion.” Investigative reporter Jeff Sharlet has documented the related Doug Coe cult extensively. Seymour Hersh and more have touched on it. It has both Catholic & Protestant membership that overlaps with Opus Dei and Assemblies of God (and other sects.) This endeavor had began in the 1930s with Hitler sympathetic-religious businessmen organized into cells based on intelligence agency model. The goal of an elite, weaponized, Christian hierarchy usurping western democratic institutions, an international endeavor based in powerful corporate board interests integrated to our most powerful law enforcement, intelligence agency and military personalities, is nearly within reach for what amounts to a self-annointed ‘chosen’ Christian religious cult-international criminal syndicate.

So long as the left embraces a mythology induced myopia that precludes a straightforward exam of this reality, the deep state will remain poised to win at the end of a day that is not very far away-

f6

^ Daniel Ellsberg behind the curtain

Related:

WikiLeaks & Spy Agencies Distracting from the real actors

Background material on America’s deep state:

Sociopaths & Democracy

6 November 2021: re-titled,  rewritten, updated article HERE

Noteworthy (dis)Information Operations

(other than Alex Jones, ABC, FOX, CNN & Co)

Marcy Wheeler at the ’emptywheel’ blog pushes ‘the Russians did it‘ disinformation

Washington Post launders (based on the historical record) what is almost certainly a CIA propaganda project to discredit legitimate alternative news outlets.

Eric Zuesse writing for the Russian site Strategic Culture posts an article that should make the Russians’ faces turn red; while fully aware it was Turkish intelligence (MIT) facilitated delivery of the sarin precursors chemicals which originated in Turkey and provided the rockets used by jihadi militants to murder 1,400 Syrians at Ghouta in August 2013, Zuesse ‘pens’ blame on Hillary Clinton via the CIA’s Libyan arms pipeline to Syria and cites Seymour Hersh as a source for his article’s assertion. Zuesse had already known (personal correspondence) the sarin did not originate in Libya but was provided by a Turkish chemicals company. The question the Russians should be asking themselves is, why frame the established international criminal Hillary Clinton, whose known crimes are many, with superfluous accusation that can’t hold up? What’s the point? The result is Strategic Culture damaged as a credible information outlet and in the meanwhile a case made Strategic Culture has been subverted to serving NATO & Turkey’s purpose; where it can be accurately stated attention has been diverted from the actual perpetrators of a NATO linked war crime.

Kick-ass Cookies publishes the official CIA history of the JFK assassination cover-up (back to the old ‘blame Cuba’ bs) as though it were gospel truth. I left the comment ‘why not just take your material from a David Ignatius novel.’ The CIA method is to publish revisionist history in classified format for ‘inside’ consumption; then ‘quietly’ declassify the same – thus appearing to take responsibility while in actuality pumping disinformation out to alleviate questions in the minds of their own agency personnel in endeavor that ultimately is intended to cover the criminal tracks of the worst of the agency’s legacy.

*

LiveLeaks.com; at ‘LiveLeaks‘ Paul Moriera’s film ‘Masks of the Revolution’ had been accompanied by this patent disinformation, since taken down:

“Documentary: Ukraine – Masks of revolution. Eng. Subs. VPE presents highly anticipated, contorversial (to some) documentary about so called Maidan revolution. Movie itself has been produced by high ranking agents of Kremlin inside of French Canal+ TV channel”

^ This small snippet (blatant lie, actually) is a smoking gun LiveLeaks is penetrated/co-opted by western intelligence; intent on discrediting Moreira’s work. This film has Kiev’s ‘authorities’ (empowered by CIA backed neo-nazis) squealing like electrocuted pigs, so it hit a nerve.

*

Vice and MI6 Example of how news outlets spawn disinformation operations on behalf of intelligence agencies in geopolitics

*

The Myth of Daniel Ellsberg, a mole on the left. Daniel Ellsberg is an intelligence agent fingered by a former Pentagon Liaison to the CIA, L Fletcher Prouty, as the center of a conspiracy at the CIA to shift responsibility of the Vietnam war policy failures from  CIA to Pentagon. Supports disinformation operations and its agents, notably WikiLeaks & Julian Assange:

Julian Assange manipulated by intelligence agencies, WikiLeaks is at the center of distracting from truly serious issues, deflecting attention from the most egregious criminal actors and actions behind the scene in Washington, such as the Doug Coe cult which poses the most significant internal danger to western democracies and is never touched by Assange (or Ellsberg & Robert Parry.)

Robert Parry spreading the left’s Anti-Federalist urban legend. The Poison Fruit  collection breaks down Robert Parry’s false flag journalism where Parry attacks false narrative with alternative false narrative, one of the most insidious method of disinformation.

The CIA And Nonviolent Resistance on intelligence engineered misreporting

Zero Hedge Drinks The Kool Aid Zero Hedge picks up TomDispatch and then (update) goes on to publish an article giving impression the “28 pages” will point to Saudi Arabia as the sole responsible party for 9/11 (altogether ignoring Dick Cheney’s role)

The Intercept Takes A Dive Worthy of a BBC propaganda piece

Elliot Higgins on MH 17 New disinformation? (oh yes)

On Edward Bernays & Propaganda  Critical reading

Wikipedia edited by CIA and numerous military-industrial & for profit corporations

CIA busted by Snowden leak Former DCI William Colby’s old quote “The CIA owns everyone of any significance in major media” is as true today as when he made the statement many years ago; The Intercept has published information catching mainstream media red handed vetting their stories with the Central Intelligence Agency. Related: CIA & The Media Carl Bernstein & The Intercept, then & now

The Daily Beast shill platform for noteworthy neo-con/neo liberal professional personalities like Bernard-Henri Levy, propping up the most dangerous warmongers & their policies

TruthDig slips mainstream disinformation into an ‘alternative mainstream news’ format, for instance when the egotistical social moron Donald Trump questions McCain’s (highly questionable) reputation as a war hero, TruthDig is right there to defend the neo-fascist war monger McCain. Trump being an idiot doesn’t necessarily mean he called that particular shot wrong.

Mark Galeotti intelligent, personable disinformation master, with a focus  on crime in geopolitics that is almost entirely one sided. Develops a portrait of Russia’s underworld in relation to Kremlin politics and absolutely panders to a pro-Western bias in the process. Critical insights challenging his work are disallowed in comments at his blog

Sylvia Longmire sanitizes the narrative on the drug cartels, ignores the deep and longstanding USA intelligence involvement and no mention of the rampant, related USA corruption

Robert Dreyfuss at the Nation Magazine; employing patent disinformation technique

2 paragraphs daily a sort of condensed neo-con/neo-liberal devotional to the moral inversions of empire, pretty much 100% dedicated to salvation of those necrotic ideals, policies and personalities most invested in humanitarian violence in service of greed. Articles often authored by PhDs, going to show authentic intelligence (no pun intended) is not necessarily going to be discovered in academia.

National Public Radio Launders CIA information operations

VICE News Frequent CIA friendly, professional disinformation integrated to editorials, panders to a mostly Russo-phobic conservative audience

The Moscow Times is a New York Times clone pandering to anti-Russian propagandists in area of foreign policy particularly. The fact of the site not blocked in Russia makes a lie of western media claims of draconian Russian censorship of press outlets-

endthelie.com CIA friendly, professional disinformation aimed at average IQ of 90, articles linked to and quoting mainstream media outlets. Initial criticisms might be posted by comment moderators but trolls assigned to comments for purpose of assassinating persons with valid criticisms and moderators who do not post intelligent rebuttals

Small Wars Journal claims the following…

“We do not screen articles for conformance with a house view; our only position is that small wars are wicked problems warranting consideration of myriad views before action, to inform what will no doubt be imperfect decisions with significant unintended consequences”

but in fact panders to military industrial ‘in house’ projects to keep ‘small wars’ going with failed counter-insurgency policies:

“In spite of the rushed and uncertain character of the Afghan force development, the president chose to provide the minimum recommended mix of U.S. advisors, enablers, and counterinsurgency forces recommended by ISAF for only one year.  This, in spite of the fact that the U.S. military has consistently understated the need for advisors, aid, and prolonged effort in their past plans in Vietnam, Iraq, and other operations

…from ‘think tanks’ such as CSIS with corporate friends like Condoleezza Rice and General James Jones.

WhoWhatWhy.org and Russ Baker, putting new spin on the lies of 9/11. Having emailed Baker some perfectly reasonable tips suggesting examining his material and support…

Hi Russ

Been checking out your stuff, some of it pretty appealing. But then, (full disclosure) I notice some suspect persons on your board;

Daniel Ellsberg and his largely un-investigated relationship to Edward Lansdale, here’s a snippet

http://www.counterpunch.org/2003/03/08/will-the-real-daniel-ellsberg-please-stand-up/

Robert Dreyfuss whose Ukraine reporting is so CIA friendly as to be disgusting. His longtime Ford Foundation (CIA) funded ‘Nation Institute’ turns out all sorts of disinformation such as the professional handwringing TomDispatch misdirecting people from the real danger zones.

As I’m typing this, I’ve been listening to your recent radio interview ‘refugees, 9/11 and more’ relating to the Saudi elements concerning 9/11 and invite a read of:

https://truthandshadows.wordpress.com/2015/09/18/28-pages-of-misdirection/

If interested, here is my story:

https://ronaldthomaswest.com/2014/02/24/the-alpha-chronology/

I would simply note many unsuspecting people are what are termed ‘assets’ in spy craft, despite the fact of a sincere belief in what they’re engaged in. The courageous ones will look deeper when apprised of certain possibilities…

Ron West

http://ronaldthomaswest.com

“The history of the great events of this world are scarcely more than a history of crime” -Voltaire

…I received a perfectly equivocating reply (he forbid me to share) including patently absurd advice on my mental state.

to be continued…

*

f5

%d bloggers like this: