Archives for posts with tag: NSA

“Cohn’s job was to run the little boys. Say you had an admiral, a general, a congressman, who did not want to go along with the program. Cohn’s job was to set them up, then they would go along” [1]

What is interesting about this small snippet is,

1) Concurrent to the present Epstein case, a Pentagon pedophilia scandal of epic proportions is not followed, juxtaposed to the Epstein reporting or even reported on at all by mainstream press [2]

2) The ‘con’ pimping little boys to the Pentagon and Congress happened to be Roy Cohn, a longtime mafioso attorney who cross-references both MOSSAD & CIA via organized crime and, as well, Cohn was a Donald Trump mentor.

3) “Many of the same names that surrounded Cohn until death in the late 1980s would later come to surround Jeffrey Epstein, with their names later appearing in Epstein’s now-infamous “little black book”” [3]

Other than how it happens Trump (to now) either knew better and/or managed not to be trapped into compromising recording with minors, the question that arises is, how the pedophilia blackmail overlay works out between CIA & MOSSAD relevant to the Pentagon, where (an estimated) 20% of the vast Department of Defense has been plugged into intranet child pornography. [4]

But first:

The lady doth protest too much, methinks -Hamlet Act III, Scene II

“We will get to the bottom of what happened, and there will be accountability” -Attorney General William Barr.

That’s pretty ‘rich’ when it is coming from George H.W. Bush’s, CIA associated, Attorney General who’d been boss of the Department of Justice, when DoJ was busy covering up intelligence agency crimes while sabotaging the Iran-Contra investigation. [5]

“A quarter century ago, the president’s attorney general, William Barr, staunchly opposed the independent counsel’s investigation of [Iran-Contra] wrongdoing in the White House, and he also firmly supported [George H.W.] Bush’s use of pardons as a means of self-protection” [6]

But actually, Barr overseeing the Epstein case cuts a bit closer to home:

“Prior to resigning from his post at the CIA, Gregg had worked directly under William Casey and, in the late 1970s, alongside a young William Barr in stonewalling the congressional Pike Committee and Church Committee, which investigated the CIA beginning in 1975. Among the things that they [the committees] were tasked with investigating were the CIA’s “love traps,” or sexual blackmail operations used to lure foreign diplomats to bugged apartments, complete with recording equipment and two-way mirrors” [7], [bold RTW]

Then, we have rogue CIA officer Frank Terpil:

“Historically, one of Wilson’s Agency jobs was to subvert members of both houses [of Congress] by any means necessary…. Certain people could be easily coerced by living out their sexual fantasy in the flesh…. A remembrance of these occasions [was] permanently recorded via selected cameras…. The technicians in charge of filming … [were] TSD [Technical Services Division of the CIA]. The unwitting porno stars advanced in their political careers, some of [whom] may still be in office” [8]

And then, oops! … it kinda all spills out:

Bush41-call-boys

One of the most critical parts of the scandal surrounding Spence, however, was the fact that he had been able to enter the White House late at night during the George H.W. Bush administration with young men whom the Washington Times described as “call boys.” [9], [10]

Except for the fact much of the reporting had been ‘resolved’ with dropping dead investigators & witnesses, and the subsequent suppression of this documentary detailing William Barr’s DoJ (FBI) sabotaging the investigations [11]

 

Now, let’s just mention in passing, beyond CIA & MOSSAD, there are additional, ‘quasi-NGO’ intelligence agencies move into the pedophilia play; “The Fellowship” or “The Family” (the Coe Cult behind The National Prayer Breakfast)…

“A lot of their key men in a country would be the intelligence [CIA] officers in the American embassy. Throughout their correspondence, that’s the kind of guy they would like to have involved [And] They always had a lot of Army intelligence guys involved, Pentagon guys” [12]

&

“Let’s say I hear you raped three little girls. What would I think of you?” The man guessed that Coe would probably think that he was a monster. “No,” answered Coe, “I wouldn’t.” [13]

…and the Catholic Church where pedophilia is not only run rampant but…

“Most Catholics don’t realize that the principal gatherers of intelligence on the part of the Holy See are the apostolic nuncios and their diplomatic staff, just like the ambassadors and staff of embassies that are deployed around the world by every nation-state” [14]

&

“the Vatican is .. relying increasingly on reactionary troops. It is closing ranks with evangelists, bible fundamentals and extremely reactionary forces” [15]

…this (immediate) preceding is then punctuated with a relevant exclamation point going to a direct meeting:

“On June 5th [2014] Pope Francis met in private with Doug Coe, one of the most influential evangelicals in the US and head of the Family” [16]

Now, in the American intelligence political pedophile hen-house longtime CIA operative/Attorney General William Barr is overseeing investigation of, there are numerous ‘hens’ belonging not only to the CIA but also belong to MOSSAD, The Family, and the Catholic Church. Then we have to factor in the Department of Defense entities Defense Intelligence Agency & National Security Agency with this proposed 2019 Act of Congress:

“The END Network Abuse Act would require the Pentagon to enter into agreements with groups including law enforcement, child protection services, social services, and trauma-informed healthcare providers in order to cut down or halt the spread and impact of these images on DOD networks.

“The National Criminal Justice Training Center, one of the groups that has thrown its weight behind the bill, reported in 2018 that DOD’s network was ranked 19th out of almost 3,000 nationwide networks on the amount of peer-to-peer child pornography sharing” [17]

I suppose in 2019 we’re not supposed to notice the Department of Defense has been stonewalling any solution to this particular problem for over a decade, here’s the 2010 language referring to a problem investigators first identified in 2006:

“Due to DCIS [Defense Criminal Investigative Service] headquarters’ direction and other DCIS investigative priorities, this investigation is cancelled” [18]

Recalling MOSSAD asset…

“Cohn’s job was to run the little boys. Say you had an admiral, a general, a congressman, who did not want to go along with the program. Cohn’s job was to set them up, then they would go along”

…these several decades later, the actuality of the problem is grown immense; if The Family (who absolutely owns Mike Pence, and likely Mike Pompeo and probably William Barr) wants an arms deal to their international favorites, they have their hens, whether Congressmen to listen attentively and generals and admirals to testify to the proposal positively, MOSSAD has the same (possibly the strongest pedophilia blackmail group), if the Catholic Church wants a particular policy, their hens are in the hen-house as well, not to mention The CIA and the Department of Defense have their golden egg-laying hens who produce desired result at the many snaps of these diverse blackmailing fingers. And we’ve not touched the fact this sordid business is spread throughout the NATO states, the Western intelligence agencies playground.

THE BIG problem with all of this is, it cannot be intelligently unwound. Example given is where it is all at now, if you lift the lid on MOSSAD, the CIA is also revealed, the overlay is problematic. Too many of these political prostitutes are shared property in what amounts to a communally owned hen-house. This is absolutely a reasonable assumption based on the recent investigative series by journalist Whitney Webb, augmented with a few of this reporter’s (yours truly) alternative sources. [19]

Now, we come to Donald Trump. Sort of like it is disingenuous when the Hollywood #MeToo victims behave as though they they’d been somehow justified in having gone along and kept their mouths shut (at least Marilyn Monroe had been honest enough to admit the blow-jobs were worth the million $$ contract) and deny any element of having been prostitutes or not knowing what they were getting into (Hollywood is socially incestuous to point one could observe the faces don’t change, only the couplings), it should be unreasonable to assert Trump wouldn’t have known what was going on in Roy Cohn’s & Jeffrey Epstein’s social circles.

Is there solid evidence of Trump’s proactive involvement? Nothing yet. The one (2016) accuser seems to have been a probe or feint (my personal assessment.) The real problem with the 2016 narrative is the woman who ‘profiles’ as Epstein’s ‘pimpette’ Ghislaine Maxwell is clearly accessory to child rape according to the (dropped) lawsuit narrative, yet incriminates herself when it is reported:

“The woman identified only as Tiffany Doe in the lawsuit, a ‘trusted employee’ of Epstein’s,’ corroborated Johnson’s’ allegations in a telephone call with DailyMail.com, but she refused to reveal her full identity” [20]

This almost seems like a 3rd party (intelligence agency) blind feeler to see what reaction it might draw from (and/or attempt to plant paranoia in) Trump. Question of law: Did this information derived from deposition require a criminal referral concerning Tiffany Doe as accessory to child rape per the Canon of Ethics governing counsel? What became of that? The story is full of holes.

This is followed on by Epstein accuser Virginia Giuffre (nee Roberts) denial of any participation by, or even sight of, Trump at Jeffrey Epstein’s minor child rape parties. [21]

It is perfectly possible will be no ‘smoking gun’ ties Trump to having screwed Epstein’s underage girls or otherwise engaged in pedophilia. Another observation (not a defense) is, everyone who HAS NOT partaken of child sex in close proximity to these social circles of power serving the powerful (Epstein’s ‘black book’) had to be turning a blind eye to those who were. In this case, Trump would be far from unique. Did Trump mentor Roy Cohn warn Trump early on? That question (and questions like it) will probably never be answered. On the other hand, Trump profiles (paranoid to point of germ-o-phobe) as someone with a better chance of avoiding the intelligence agencies designer drugs; where the will is broken down in sexual entrapment so sophisticated, those poisoned never realize what had happened to them, how they suddenly wanted to fuck a little kid while not even caring if they knew it were being filmed. It would make sense Trump had security assigned to his food intake, little different to a king’s ‘food taster.’ Especially if he’d been tipped off.

Finally, the question that can be asked but cannot yet be answered. In whose interest is it the Epstein pedophilia operation be blown open? Or is it just some cosmic snafu biting the shadow government & deep state on the butt? Stay tuned.

 

[1] https://www.mintpressnews.com/shocking-origins-jeffrey-epstein-blackmail-roy-cohn/260621/

[2] https://thehill.com/policy/cybersecurity/451383-house-bill-aims-to-stop-use-of-pentagon-networks-for-sharing-child

[3] see link at reference [1]

[4] https://ronaldthomaswest.com/2019/07/05/pentagon-pedophiles/

[5] https://www.cnbc.com/2019/08/12/bill-barr-blasts-jail-where-jeffrey-epstein-killed-himself.html

[6] https://historynewsnetwork.org/article/171025

[7] https://www.mintpressnews.com/blackmail-jeffrey-epstein-trump-mentor-reagan-era/260760/

[8] see reference [7]

[9] same as reference [8] & [7]

[10] https://archive.li/ZDiAZ

[11] http://vimeo.com/76198401

[12] https://www.sott.net/article/191599-Meet-The-Family

[13] https://www.salon.com/test/2009/07/21/c_street/

[14] https://www.churchmilitant.com/news/article/santa-alleanza-the-vatican-intelligence-service

[15] https://www.spiegel.de/international/world/interview-with-gay-theologian-david-berger-a-large-proportion-of-catholic-clerics-and-trainee-priests-are-homosexual-a-730520.html

[16] https://www.dailykos.com/stories/2014/7/17/1314574/-Pope-Francis-Met-With-the-Head-of-the-Family-the-Secretive-Politicians-Based-in-DC-Townhouse

[17] https://thehill.com/policy/cybersecurity/451383-house-bill-aims-to-stop-use-of-pentagon-networks-for-sharing-child

[18] https://constantinereport.com/the-pentagons-pedophile-problem/

[19] https://ronaldthomaswest.com/2019/08/09/the-epstein-chronicles/

[20] https://www.dailymail.co.uk/news/article-3894806/Woman-alleged-raped-Donald-Trump-13-Jeffrey-Epstein-sex-party-DROPS-case-casting-doubt-truth-claims.html

[21] https://archive.li/DeR08

*

Related: The Epstein Chronicles MOSSAD works the USA

*

Social essays that critique Western culture from the outside looking in:

Raphael’s Paradox

A Tribal Perspective

Leadership in Time of Crisis

Reality Check

Natural Selection for Autistic Traits

Oracle

Divination

The Trickster in Equilibrium

The Rise of Narcissism

Privatization for Dummies

 

-under construction-

Black_site_ships - 1 (1)

Ghost ship. A ‘ghost’ prisoner’s fate is no better

The CIA versus NSA (Pentagon) internecine war ticks up a notch with CIA presstitute AP snitching out the Pentagon’s torture ‘black sites’ on ships:

“THE SHIPS”

“Several inmates said guards frequently threatened prisoners by saying they would “take them to the ships.”

“Senior U.S. defense officials flatly denied the U.S. military conducts any interrogations of Yemenis on any ships.

“We have no comment on these specific claims,” said Jonathan Liu, a CIA spokesman, adding that any allegations of abuse are taken seriously.

“But a Yemeni officer told AP he had worked on a vessel off the coast where he saw at least two detainees brought for questioning.

“He said the detainees were taken below deck, where he was told American “polygraph experts” and “psychological experts” conducted interrogations. He did not have access to the lower decks and thus had no first-hand information about what happened there. But he said he saw other Americans in uniforms on the ship. The officer spoke on condition of anonymity because he feared retaliation for discussing the operations.

“A second Yemeni officer said he was involved in moving detainees to a ship, where he said he saw foreigners though he didn’t know their nationality. “They say these are the important ones. Why are they important? I have no idea,” he said of the detainees.

“A top official in Hadi’s Interior Ministry and a senior military official in the 1st Military District, based in Hadramawt, also contended that Americans were conducting interrogations at sea, as did a former senior security official in Hadramawt. The three men spoke to the AP on condition of anonymity because they were not authorized to share military information”

No doubt the American public will see this as some revelation but actually this old news:

Black_site_ships - 1

Obama didn’t actually close down black site prisons, he merely relocated them to preexisting black site ships run by the military. This (above screenshot) article is from 2010:

“U.S. PRISON SHIPS: On June 2, 2008 UK’s Guardian reported, “The US has admitted that the Bataan and Peleliu were used as prison ships between December 2001 and January 2002”. According to Reprieve, the U.S. may have used 17 ships as “floating prisons” since 2001. Detainees are interrogated on ships and may be rendered to other, undisclosed locations. Reprieve expressed concern over the time the U.S.S. Ashland spent off Somalia in early 2007. According to The Guardian, “At this time many people were abducted by Somali, Kenyan and Ethiopian forces in a systematic operation involving regular interrogations by individuals believed to be members of the FBI and CIA. Ultimately more than 100 individuals were ‘disappeared’ to prisons in locations including Kenya, Somalia, Ethiopia, Djibouti and Guantanamo Bay. Reprieve believes prisoners may have also been held for interrogation on the USS Ashland and other ships in the Gulf of Aden during this time.”

The U.S. Navy, through a spokesman, said, “There are no detention facilities on US navy ships” but Commander Jeffrey Gordon told The Guardian some individuals had been put on ships “for a few days” during initial days of detention.

Reprieve quoted one prisoner released from Guantanamo who was on one of the U.S. ships who said there were 50 other prisoners in cages in the bottom of the ship and they were beaten even more severely than in Guantanamo. Clive Stafford Smith, Reprieve’s legal director, is quoted as saying, “They choose ships to try to keep their misconduct as far as possible from the prying eyes of the media and lawyers. We will eventually reunite these ghost prisoners with their legal rights”

Well, good luck with ‘reuniting’ those ‘ghost’ prisoners with their families, recalling it was Henry Kissinger mentored the South American military strongmen who ‘disappeared’ tens of thousands of ‘suspected’ leftists. The relevance? Multiple tens of thousands of ‘ghost’ prisoners remain unaccounted for, of the estimated 100,000 or so ‘renditioned’ prisoners directly related to the USA’s war on terror. The real news is, it would appear those prisoners who aren’t ‘outsourced’ but meet ‘importance’ criteria enough to be sent to ‘The Ships” are disappeared and don’t come back. How many? This, on top of renditions math that doesn’t add up, the ‘lie by omission’ the AP is never going to admit (if only because it gets sticky, in that case, for the CIA, not only the Pentagon.) Adding ‘The Ships’ to the known CIA renditions flights, we ALL can know the Feinstein torture investigation had been little more than a whitewash.

Here’s my article on the renditions math from December, 2014:

122 KNOWN aircraft were used in renditions within a database of 11,000 flights (by those aircraft) during the known period of renditions. With 119 ‘detained suspects’ acknowledged in Feinstein’s ‘torture report’, the first problem we see is, there are more planes known to have renditioned people than the ‘torture report’ admits had been renditioned. Ignoring the idea the CIA had required use of a separate plane for each rendition (+3 planes), the initial math comes out to 92 flights per prisoner. Let’s toss 1/2 the flights and we have 46 flights per prisoner. Let’s toss 1/2 the flights again, and we have 23 flights per prisoner. Ok, so now we’ve thrown out 75% of the flights by known renditions aircraft and that works out to 25% of the flights would amount to renditions of 2,750 prisoners. So, let’s cut that by half again; if 12.5% of the known flights were renditions, there would be 1,375 kidnapped and or captured persons flown by the CIA. Cut in half again, to 6.25% of flights by planes known to fly renditions, and we should have 688 involuntary ‘transportees.’ If 3% of the flights by KNOWN renditions aircraft, were transporting ONE prisoner each, depending on number of stops, we’d still have up to 344 people (versus Feinstein’s 119), relating to the CIA renditions.

The disparity of the math is too great to give any sense of  credibility or reliability to the Feinstein report. And there is no present way of determining whether flights ‘disappearing’ people (dumped at sea) had been employed in the (CIA supported) Latin America junta style.

Now, it stands to reason we don’t have close to all of the planes and flights identified because many of them would have been military. As well, we know the American military has not been even close to fully probed over its own ‘black site’ torture centers, this documentary film’s existence (suppressed in American media) is a singular example:

How many people are missing? We’ll never know so long as the people perpetrating the crimes (CIA-U.S. military) are the people providing access to the information, such as the CIA had in the case of the Feinstein probe. The Feinstein ‘torture report’ can be little more than a ‘we’ll acknowledge as little as possible’ white-wash or professional psychological operation employed for purpose of damage control.

There needs to be an authentic accounting. Most or nearly all flights that weren’t to ‘black sites’ were likely military flights to, examples given, Bagram and Guantanamo. The point of using civilian jets together with filing false flight plans is to cover criminal activity such as kidnap renditions. A civilian jet points to a kidnap rendition or less often, someone handed over by a 3rd party, for instance Pakistan, as opposed to a battlefield capture. What are the structures? Aside from inferred CIA black sites in the  Senate report identified from other sources (Poland, Romania et al) it is known prisoners were delivered for torture to 3d party nations Morocco, Jordan, Syria, Egypt and Libya, there was a ‘black site’ under military control at Bagram and there well may have been a ‘black site’ at Guantanamo separate from the regular detention facility, not to mention strong indicators pointing to Diego Garcia. As well, I’ve seen reports Special Forces in Afghanistan, working with CIA, had numerous small (off record) detention facilities in remote areas where prisoners had been shell-gamed to evade rules, and reports of black site jails on U.S. navy ships. Also there are indications renditions had been reduced in favor of stepped up assassinations under Obama. The subject of renditions is a longs ways from broken open in any sense of reality.

And there is a large question yet looms .. ‘what had been the fate of the women prisoners’ ?

June Notes, Week Three the 3rd soap installment

June Notes, Week Two spooks & USA infrastructure

June Notes, Week One weapons sales, media whores & more

Related:

“We Tortured Some Folks”

Reorganizing Murder Inc

*

A Sociopaths & Democracy project

*

b10

MP Stroebele (Ron West photo)

Dear MP Stroebele

As you are now aware, and this cannot be denied with the recent news coverage naming yourself…

http://www.washingtonpost.com/world/europe/nsa-scandal-rekindles-in-germany-with-an-ironic-twist/2015/04/30/030ec9e0-ee7e-11e4-8050-839e9234b303_story.html

…the German parliament has been deceived by rank criminals in the Merkel government.

Therefore you can no longer offer any excuses (in the form of your ongoing, and cowardly silence) for refusing to bring my case forward, particularly when you state to media:

““It will be extremely embarrassing for Merkel, who prides herself on her close relationship with [French President Francois] Hollande, if it turns out that the BND helped the NSA to spy on French politicians. Obama knows the feeling,” said Hans-Christian Ströbele, a member of the parliamentary intelligence control panel from the Green Party”

Is ‘embarrassment’ excuse enough to continue covering up BND or other parties in German government complicity in concealing, and perhaps even assisting, attempted murders on German soil? I will draw your attention to our meeting in Berlin at the Snowden rally in July of 2013:

https://ronaldthomaswest.com/2013/07/09/reflections-on-a-snowden-rally-2/

Mr MP Stroebele, I would very much like to get on with the normal life I am entitled to, as an ordinary citizen who has committed no crimes. You OWE that to both justice and to myself. It is past time to bring my case forward.

Regards

Ron West

http://ronaldthomaswest.com

“The history of the great events of this world are scarcely more than a history of crime” -Voltaire

A story of how defending Native American sacred lands had morphed, over a period of 20+ years, into a game of international intrigue & surviving assassination; with conclusions

Chronology of Events in the Case of Ronald Thomas West
(abridged summary)

1

In 1987 I was asked by Floyd Heavyrunner, traditional war chief of the Blackfoot Indians of Montana, to monitor interest by United States Department of Agriculture (Forest Service) in development of oil and natural gas in the Blackfeet tribe’s treaty lands known as the ‘Badger-Two-Medicine’ also known as the ‘Ceded Strip’, subject to tribal rights under the so-called ‘Grinnell Agreement’ also known as the ‘Treaty of 1895.’

In 1988, Floyd retained Mark Mueller of Austin, Texas (licensed in Montana) as attorney of record for the Blackfoot ‘Brave Dogs Society’ also known as the ‘Crazy Dogs’, in Floyd’s capacity as traditional cultural leader of that ancient tribal organization.

By 1991, as lead investigator on behalf of the Brave Dogs Society, in association with Mark Mueller, I had developed copious documentary evidence of a criminal ring working inside the United States Department of Agriculture, on behalf of CHEVRON Corporation, detailing a concerted effort to counterfeit compliance to laws that otherwise should have protected the area on behalf of the Brave Dogs Society, to include officials of the United States pursuing the following illegal acts, including felonies:

Lying to the Brave Dogs and counsel

Lying to the public

Lying to Congress about following specific applicable laws (National Historic Preservation Act ‘traditional cultural properties)

Concealing Forest Service knowledge of those applicable laws from the Brave Dogs, counsel and the public

Concealing Forest Service officials training in those same applicable laws

Deliberately cheating those same laws, to the benefit of CHEVRON

These incriminating documents, taken together, indicate a pervasive and organized criminal network represented in government officials, working on behalf of CHEVRON for the purpose of deliberately counterfeiting compliance to law, going to the highest levels of the United States at Washington DC. This particular criminal event was organized and run out of the Northern Region One Headquarters of the United States Forest Service at Missoula, Montana, and implemented via the Great Falls, Montana, offices of the Lewis and Clark National Forest.

These documents were incorporated into administrative appeal when the CHEVRON (and FINA) permits to drill were approved in what amounted to a ‘rubber stamp’ process at the Northern Region One Headquarters at Missoula. This appeal stopped the project in its tracks. The quandary of coving up the criminal network was accomplished by bureaucratic fiat, when the FBI declined to become involved (I personally briefed an agent who reviewed the documentation and acknowledged their substance but claimed he had no authorization to act and referred to the United States Attorney (United States Department of Justice) office at Billings, Montana, whom he stated were very well aware of the issues), after the United States Department of Agriculture Inspector General declined to investigate, the USDA Inspector General’s office saying they would not become involved on the pretext of the issue had already been raised in the administrative appeals process. Because the government (and Chevron) did not dare to allow the documents into the federal court record, where they would be put in front of a judge (or judges, on appeals in court litigation), a political deal involving lease swaps was engineered by United States Senator Max Baucus with CHEVRON and CHEVRON backed out. When I personally managed to place the incriminating documents into the hands of (recently new) Forest Service Chief Floyd Thomas, he attempted to close down the Northern Region One Headquarters and move those operations to Denver, where they ‘would fall under closer supervision.’ It took the efforts of two United States Senators, Max Baucus and Conrad Burns, to reverse this.

Note 1) REDACTED

Note 2) Two attorneys briefing the government side (Forest Service) on Native legal issues during this period, John Yoo & Jay Bybee, would later become infamous as Bush ‘torture lawyers’ in association with Condoleezza Rice. Condoleezza Rice, in turn, has had (previous and post Bush regime) close association with CHEVRON.

Note 3) the Montana ‘Northern Region One’ headquarters has a long association with CIA, dating to the 1950s and still an active relationship into the 1970s and probably through 1980s and beyond, relating to air services, surplus property, and laundering aircraft used in agency gun running & rogue elements (black budget) international narcotics trafficking.

Note 4) Immediately following my investigative result in 1991, revealing the criminal ring inside government working for CHEVRON, the Veterans Administration suddenly, spuriously, diagnosed me as suffering “Psychosis.” I managed to undo this by independently having myself evaluated by the same medical center used by the VA to to study schizophrenia and came up clean.

Note 5) Following this, my VA records were reviewed by a ‘specialist’ from Washington, DC, and certain documents vanished, making it appear as though I had defrauded the VA. A hearing was scheduled, where I produced a copy of a missing critical document, necessary to my defense, and the hearing was cancelled on the spot and charges dismissed.

Note 6) In 1998 I resigned from employ with Mueller Law office on account of health issues.

2

In 2001, I relocated, from West Glacier, Montana, to Sandia Park, New Mexico. After, I had enrolled my youngest son in the East Mountain High School (a charter school), an accelerated learning institution, in the late Summer of 2005. This school happened to have significant ties to powerful personalities in the Albuquerque corporate military-industrial complex.

By late Fall, intense pressure had been initiated, in form of undue harassment, it would appear intended to make us quit the school.

I initiated a ‘pro se’ investigation, to uncover the core reason(s.) In the process of this, what had been uncovered by myself were:

Felonies tied to the school’s pattern and pervasive civil rights violations of minority students particularly, and other students, by undue influence of ultra right-wing, racist, ‘Christian Dominion’ personalities.

What appears on its face to be an American charter school (EMHS) with embedded intelligence agents employed as instructors.

The possible use of school sponsored ‘field trips abroad’ as cover for covert operations in Latin America and Europe.

Meanwhile I had caused a parallel investigation (late 2006 into Spring 2007) into the school’s illegal activities, by a member of the school’s governing council, Jim Healy, in regards to harassment of my son and myself. In the course of this second (parallel) investigation by governing council member Jim Healy, I was approached by another governing council member, David Walter, who informed me I was stepping on toes of members of “The Council on Foreign Relations” and warned me (a threat) “Do not dare involve attorneys.” Walter further stated any action to hold the school accountable “Had no chance” under any circumstance. In less than a year, a teacher (intelligence embed, almost certainly CIA) from the school, Vince Langan, was part of a team that attempted to ambush myself in Berlin.

With the East Mountain High School case unresolved, recently divorced, my home sold and my youngest off to college, I had left the USA, in July 2007, to attend a conference at Johannes Guttenberg University, at Mainz, Germany. I had no intention of returning to the USA in short term, realizing I’d made powerful, corrupt enemies, without adequate resources necessary to pursue closure of the charter school case. However in the meanwhile I’d indicated to persons associated with the school’s administration I had no intention of letting the case go. This produced following result:

On 3 October, 2007, I routinely scouted the geld automat (ATM or automatic teller machine) I typically used at the Johannes Thaler Chaucee mall, in the Berlin suburb of Britz. In the course of my (professional security training) assessment of whether there were any threat, I managed to trigger to action a team waiting in ambush at the ATM location. Because I was on to them before they realized they’d been compromised, I was further able to get a point blank visual identity of Vince Langan of East Mountain High School, one of the triggermen, in circumstance that both, allowed myself to escape and caused Langan to realized he’d been identified. Two weeks later, I had a second close encounter with attempted assassination, with persons unknown, on the number 7 underground.

I immediately (following morning) left Berlin for Lindau (Bodensee.)

Note 7) Tracking myself to an ATM location abroad required access to my banking information, which can be had with a so-called ‘National Security Letter.’ This points to corrupted FBI involvement.

3

Having left Berlin for Lindau in mid-October, I shortly arranged via third party (REDACTED) an invitation for German authorities to monitor my situation (“follow me and watch”) This was a deliberate ploy to trap what I believed (at that time) was attempted murder to silence a whistle-blower (myself) in relation to felonies committed by wealthy, corrupt personalities associated with East Mountain High School.

Two weeks later, when I was walking one early Sunday morning, 4 November, 2007, when few people were out and about, a silenced bullet fired by a rifle at long distance, narrowly missed and punched a hole in a parked car I was walking past.

Subsequently, on a Tuesday, 4 December, 2007, I understood I had picked up the German surveillance I had requested, when traveling to give a presentation to a class at (REDACTED), and German police swept the train I had taken, searching one passenger in my car, and asking for identity cards of everyone and interrogating everyone except myself.

Note 8) The high velocity projectile had hit the parked car I was walking past, with such force, it was clear from the sound, the projectile had punched through the metal of the vehicle body, ricocheted off of a retaining wall the car was in front of, and spun to a stop beneath the car. I returned to the location after some days, assessed the possibilities and it became clear the shot had been fired from long distance, from a natural rise (hillside) with good cover, at a distance of perhaps 500 meters.

4

I had moved to Limburg in the early Spring of 2008 and then to Wiesbaden (June), accepting the invitation of the University at Mainz, to teach a course (in English) on American Constitutional law (Summer semester.) This Summer of 2008 was an intense game of cat and mouse for myself, in relation to my would be assassins/stalkers. Of my several Wiesbaden encounters, the most notable events are:

My Motorola (Razer) cellphone with its’ t-mobile USA chip suddenly quit behaving normally, it no longer showed the ’t-mobile D’ (Germany) reception logo, no longer required international code to access my voice-mail in the USA, and in fact the screen appeared (and phone behaved) as though I actually were in the USA. It had been somehow patched around or through the German reception network and appears to have been used by American intelligence (NSA) to GPS my location in real time. I converted my phone to a German t-mobile pre-paid chip.

About the time I’d noticed this phone modification had happened, a glass pellet had been shot at myself while walking a crowded sidewalk on the North side (my area of residence) in Wiesbaden. I heard what sounded like a powerful spring mechanism release behind me, and turned to look, to see a man keenly observing myself as he walked out of the crowd (brown Stetson style hard felt hat, caring an attache case) and into the street, to cross the street and get away. He kept looking at me as though expecting something to happen. When I had returned to my apartment, sat at my desk and removed my knit hat, a very small glass pellet, appearing to be filled with an opaque liquid, had fallen out of my hat, onto my computer keyboard. This pellet had been captured intact by my knit hat, where it was rolled up at the back of my head. I carefully collected (without touching) the glass pellet into a small prescription medicine bottle with my name on it, and packed it with tissue paper as a safety precaution and sent it to analysis via (REDACTED)

Following this preceding incident, I noticed it appeared as though I were being scouted for purpose of establishing my routine habits (the GPS component apparently having been lost due to my phone conversion.)

One person etched into my memory, although I did not know who she was in the Summer of 2008, was then active CIA officer Sabrina De Sousa. She jumped out on account of her smirking at myself when passing on the street. She was clad partially in the casual clothing of South Asia, and gave me a knowing smile and expression that can only be considered remarkable, when encountered in a total stranger. This marked De Sousa in my memory.

Of the several attempts during this period, one attempt clearly resembled the technique employed in the ‘Imam rapito affair’, also known as the Abu Omar case, in which De Sousa was involved. I was returning from teaching class at Mainz, when I noticed an aberration (due to my training) in what otherwise would seem a normal and unremarkable event. A group of men dressed in the typical blue German workingman clothing, taking a break.

The circumstance jumped out at me as I approached for the following reasons; there was no conversation at all, they looked ‘posed’ (stiff, as if unfamiliar with acting), had American body language and what I would call ‘Delta Force’ physiques (the sort of body build you will typically encounter in hyper-physically trained special operations soldiers.) Other than clothing, they did not resemble German laborers at all. My route on the sidewalk would have taken me between what amounted to a close, half-circle of three of these ‘workers’, and the half-circle closed to the street by the open, sliding side door, to a white, windowless van with at least one occupant.

There was a fourth ‘worker’ sitting in the passenger seat (with door open) of a car pulled up closely behind the van, concealing the van’s identity plate from behind. He appeared to be a ‘backstop’ positioned in case I’d evaded or somehow came through the initial three poised to shove myself into the van. Clearly, it was expected I would walk between the half-circle and the van. I approached as if unconcerned, to get as close as possible for visual assessment and at the last moment, instead of continuing on the sidewalk into what certainly was a ‘snatch’ and ‘rendition’ trap (I could have been popped into the van and subdued in a matter of a few seconds, less than five seconds, certainly), I walked out into street and into possible oncoming traffic (and was lucky not to be run down by a car.) Evasion was simple.

The last attempt at Wiesbaden, was when the apartment I had been renting was to be advertised for new tenants. There was an immediate response from a couple living on the United States military base there. This German couple could not take the apartment over from me too soon, they were anxious to move in as soon as possible. He was from the former GDR, was a huge George Bush fan and worked for the American military in some undisclosed capacity (evasive), and she ran a florist business on base.

She shortly called me and stated she would like to bring some packages to leave at the apartment, the evening before I vacated (on a Friday), which raised an additional red flag. I simply said to call me on the preceding Tuesday and ask then, as I could not yet know if I would be home on the evening she wished to come over with the packages. I knew (and did not say) the landlord wished to make some renovations. I left the week preceding my vacancy date, and by the time she called, the apartment had been thoroughly gone through by the landlord and I been out of Wiesbaden for a week. When she asked if the packages could be brought over on Thursday, I replied “I am in Berlin, you will have to ask the landlord.” Her reaction was to shout “He’s in Berlin!” to her husband (co-conspirator) and then her husband launched into a tirade in German… with the German authorities having an open invitation to monitor all of my phone calls, I expect they discovered two Germans working for American intelligence.

Note 9) Without going into detail, I had set up a test during this period, following shutting down the GPS of my phone, by confiding to a close confidant via Skype, technique I expected might work to take me down and succeed in assassination of myself. This was the next technique tried but I was ready for it, saw the circumstance developing and foiled the attempt.

Note 10) I will mention here, I had nearly one full year on the job training (1974-1975) in military special operations intelligence (19th Special Forces Group) with some of the most experienced of that era, and furthermore, I am highly trained in asymmetrical counter-intelligence, concerning technique I am not at liberty to discuss. However oblique reference may be made to this second instance, with referring the reader to this study: ‘Unconventional Human Intelligence Support’ by Commander L. R. Bremseth, United States Navy, 28 April 2001, Marine Corps War College.

Note 11) REDACTED

Note 12) I lost specific timeline notations from this period and going forward, due to a future failure of my laptop and resultant data loss. After the data loss event, I did not resume the habit of keeping notes on much of my experiences but am able to reconstruct some important events timeline with other records.

Note 13) By late 2008, I had realized this was no simple attempted murder case to cover up a school’s corruption, but was something by far bigger. My resolve was to take it as far as I could, in the hope of my being surveilled by German police to now, particularly, would lead to breaking the larger picture of clandestine effort in attempted assassination of myself, into the light of day. At this point I did not actually expect to survive, but was determined to do as much damage as possible to the criminal element, through exposure via the clandestine arrangement of monitoring of myself.

5

After several weeks stay in Berlin, in December 2008 I relocated to Catalonia, Spain, renting an apartment in the town of San Feliu de Guixols.

My stay in Spain was intense, but I will limit my notations to a few extraordinary events.

The Spanish domestic intelligence communicated with me directly, to let me know they had picked up monitoring my circumstance. How this was communicated (including direct ‘thank you’, among other events, on several occasions) is perhaps best described using this early example: I had a remarkable encounter with a woman in a grocery store adjacent to my apartment. It was like a Woody Allen scene in a movie. Only a few days later, this precise scene was caused to be reenacted with myself by another woman who had accosted me in different store. Clearly, she had studied security video of the earlier encounter and this second encounter closely mimicked the first encounter, to let me know I was monitored.

It was while I was in Spain in 2009, CIA officer Sabrina De Sousa sued the USA for diplomatic immunity over her role in the ‘Imam rapito affair’ or the ‘Abu Omar case’, this broke into the news with her photo in online media (New York Times) and I immediately recognized De Sousa as the smirking woman I’d encountered in Wiesbaden the previous Summer. While monitoring the AP Wire (RSS feed) I also picked up a statement attributed to Italian defendant, General Nicolò Pollari, to the effect ‘Condoleezza Rice had been personally overseeing the renditions team in this case.’ He wished to subpoena Rice in his defense.

This is when the larger picture of my own circumstance first began to make real sense. If Condoleezza Rice had been ‘personally overseeing’ a renditions team that included Sabrina De Sousa, this indicated my case was not only about East Mountain High School but had ties going back to the Badger-Two Medicine case of the Blackfeet Brave Dogs Society, CHEVRON, and the Bush Sr administration. Rice’s career path has been from CHEVRON board director to Bush Jr National Security Adviser to Secretary of State (The United States Department of State is Siamese twin to the CIA) and back to CHEVRON, post Bush era. Coincidental to this, two attorneys preparing legal memos on Native American rights cited by the Forest Service in the Badger-Two Medicine case, John Yoo and Jay Bybee, had since become infamous as renditions related Bush ‘torture lawyers.’

In June of 2009, related to these new developments, I had made a brief trip to Berlin to secure the defunct NGO ‘Association for the Support of the North American Indians’ file on the Blackfeet Brave Dogs, which I knew would include incriminating, related documentation. I personally went through the file to ascertain there was a complete record of documentation on the CHEVRON criminal ring previously encountered in the Bush Sr administration (it was all there) and arranged the entire file to be sent on to (REDACTED), which was done.

Date unknown (data loss) a second silenced bullet narrowly missed, fired from a high rise in S’garo, as I walked from the suburb of S’garo, across the rise into San Feliu de Guixols. This event occurred as I passed a construction site where a stone strewn bank caused the the missed high velocity projectile to ricochet. The pedestrian in front of myself jerked his head in the direction of the bullet striking the stone, it could not be ignored.

24 October 2009, I avoided being deliberately run over by a new, red, rental car, by two dark complected males whose arms were covered in gang tattoos.

20 Feb 2010, I surprised former CIA ‘Cowboy’ Gary Berntsen (now in private contracting) at the Hotel Barcarola reception desk in S’garo, it was between 7 & 8AM, as he was checking his hit team into the hotel. We were caught on security camera together.

Gary’s initially had a stunned blank look, which became an expression as though he’d been busted with his hand in the cookie jar and wished he could crawl under a rock as I stood inches from him, literally rubbing elbows, his bodyguard just stood there staring at me with a stunned, stupid look in circumstance that completely blew their cover, I couldn’t help myself, I had to laugh at them on my way out the door. I gave them about six hours head start before posting the fact of that morning’s encounter online, where Spanish domestic intelligence looked for updates on my encounters. Berntsen & Associates were smart to flee.

On the 5th of July 2010 I spent about half an hour visiting with two very polite regional policemen [Mossos] at my door. What the policemen said, was interesting. The police copied my passport information, questioned me about details that would confirm my identity, reported in with their radio my name, my information and had me sign a statement to the effect I had lived in my present apartment “for more or less one year, to be provided to the judge” who wanted to confirm the identity of the person lived in my apartment. I made no secret of the fact I was unregistered in Spain, and I made it clear I had no intention of registering with immigration or applying for residency. The police assured me my staying in Spain was not a problem and they had no interest in anything other than confirming my identity for the judge.

It was about this time I am fairly certain I had been poisoned. I had one day, after eating out, suddenly suffered a copious sweat without fever and after, my health took a downward spiral. That and the fact Judge Baltasar Garzon had been recently been removed from the bench in Spain under immense pressure from the USA in a corrupt and politicized process (I had followed Judge Garzon’s case closely), together with the Popular Party taking power, I felt made my stay in Spain untenable. I returned to Berlin in August.

Note 14) Summer period of 2009 had since vanished from all my online email records, beginning shortly after I had this published this following letter of 18 February 2009 online, posted on 3 June 2009. Most of June, all of July and August went missing, and much more to early 2010, 4 accounts, 3 google and 1 yahoo. This coupled with my previously having been tracked via my Wells Fargo Debit Card (ATM use) and by T-Mobile USA cell employing GPS .. all point to accessing my various accounts, inclusive of phone, banking, and email accounts, via National Security Letter and law enforcement complicit in tracking me for purpose of attempted assassination in exile. The letter I had made public on 3 June:

18 February 2009
From: Ronald West
To: Federal Bureau of Investigation
Greetings FBI
I am asking a copy of this mail be placed in my file, also that a true and complete copy be forwarded to Glen Fine at the Office of the Inspector General for the United States Department of Justice-
Based on my experiences of the past 3-1/2 or so years, I request the following:

An investigation into/and comprehensive review of any related investigations which granted any agency of the United States, to include your own, access (via National Security Letter or ANY means, e.g. Executive Order or legal memorandum bypassing the ‘FISA’ court, etcetera) to my personal information (particularly to my whereabouts via ATM banking records and (GPS) cell phone, email and conversations on ‘skype’) which may have led to my several experience including but not means limited to:

In Berlin, Germany of being stalked at Johannesthalerchaucee Mall (area of Britz Sud) in very close and tense circumstance by Vince Langan (or what appeared to be his identical twin) of East Mountain High School (Sandia Park, NM) together with accomplice on 3 October 2007-
How that may relate to a few weeks later a silenced bullet narrowly missed me and punched a hole in a vehicle I was walking past at Lindau, Germany-

Under what circumstance further stalkings and what appear to be assassination attempt relating to my t-mobile phone being patched directly through to the t-mobile usa network while I was in the greater Frankfurt region, Limburg and Weisbaden, particularly in late March-early April 2008, bypassing ‘t-mobile-D’, screen showing and phone behaving just as though I were in the USA, and any relationship of that to the preceding-

And related to all of the above, review the activities of (REDACTED) as to whether or not she is or has been an asset of yours or any agency of the USA or has been in a quid pro quo relationship with yours or any agency of the USA or in any capacity or related investigations or actions going to the preceeding paragraphs, cooperated in any investigation or related action concerning me directly or indirectly, with her befriending myself for the purpose at any point in any investigation, of soliciting enough information to implicate but in fact negligently and mistakenly implicate me, short of soliciting enough information to clear me, relating to any actions and/or existing referals of yours or of any USA agency, or any person relating to any such investigations, actions or agencies- impacting my Social Security Benefits in such a way as to effectively use official capacity to bring me into the jurisdiction of the USA or otherwise tamper with my freedom of movement or any other impact on my civil liberties in a ‘R.I.C.O.’ like criminal enterprize, or under any other circumstance related to the preceeding paragraphs, cause undue review of my social security file constituting harassment and hardship in my or my family members lives-

And request the Inspector General for the United States Department of Justice independently inquire of the appropriate authorities in the Federal Republic of Germany as to any known facts of any investigations which may have been or are ongoing relating to any/all of the preceding.
I am BCC copying this communication to two attorneys, one in the USA and one in Germany. These are NOT my attorneys of record. I am copying them because they are discreet men I trust as possessing the highest possible ethical standards and I want a record of this mail in the hands of trusted 3rd parties- which includes any lawful authority, attorney or other person they may, in their discretion, additionally decide it is appropriate to place copies with.

Sincerely
Ronald Thomas West

This letter (above) was not rejected by the FBI mail server, sent to albuquerque@fbi.gov but it was not long after, I began receiving this following response to mails copied to the FBI at Albuquerque (I had, up to then, copied the FBI on my activities)

—– The following addresses had permanent fatal errors —–
<albuquerque@fbi.gov>
(reason: 550 #5.1.0 Address rejected sylvia.maruffi@ic.fbi.gov)

—– Transcript of session follows —–
… while talking to ic.fbi.gov.:
RCPT To:<sylvia.maruffi@ic.fbi.gov>
<<< 550 #5.1.0 Address rejected sylvia.maruffi@ic.fbi.gov
550 5.1.1 <albuquerque@fbi.gov>… User unknown

This (preceding) indicates my mails had been previously routed through to a ‘Sylvia Maruffi’ who appears to have been removed and her address at the Albuquerque office cancelled or changed.

In an unrelated Albuquerque Federal Court pleading that had been posted online by a litigant in May of 2009, I found the following statement:

“.. the situation being reviewed by Sylvia MARUFFI an FBI Investigative Analyst”

This clearly points to FBI Agent Sylvia Maruffi assigned to investigating myself up to the time of the letter sent to the FBI Albuquerque office on 18 February 2009 and Maruffi clearly being a ‘person of interest’ in relation to persistent attempted murders (of myself.) Incidental to this, the FBI has never acknowledged my (emailed) letter of 18 February 2009, although they were clearly in receipt of this communication.

6

I lived in Berlin from September 2010 through July of 2012. Of several incidents over this period, this one stands out:

While living in Charlottenberg (Berlin) during July 2011, I had my 1st experience with intelligence agencies using proselytizing evangelicals as cover for an assassin team. I’ve puzzled a bit over whether “Jews for Jesus” were a MOSSAD or joint MOSSAD/CIA venture but by now I’ve settled on MOSSAD. It was a Wayne Madsen article had pointed out the CIA had used missionaries in the past, in Latin America particularly, but Jews for Jesus are an altogether different animal. In Berlin, no one is going to poke their nose into the business of any Jew, it is a perfect (the MOSSAD must think) cover. This appeared to be another case of ‘quid pro quo’ (previous ‘quid pro quo’ by MOSSAD in the attempt made on the U7 line in Berlin, 14 October, 2007) or one nation’s agency intelligence acting on behalf of another nation’s intelligence agency, this is not at all unusual.

It is a double blind deniability built into operations, evangelical Christians posing as Jews. Four out of five or perhaps nine out of ten of these so-called “Jews for Jesus” are deceived and unsuspecting evangelicals simply trying to convince people to be ‘saved.’ They are flown in from around the world in shifts volunteering time as missionaries and are conveniently on hand to locate to any area where a hit operation is meant to take place.

The target is supposed to get used to seeing them in his/her area and this is supposed to produce a complacency surrounding the missionaries while your habits are studied, which U-Bahn (underground) you take and most regular times. By the time any target is used to and ignoring “Jews for Jesus”, with routines established, the unsuspecting proselytizing members are replaced with kill teams from MOSSAD wearing ‘Jews for Jesus” shirts and the target (the theory must go) will not notice he/she has been marked going into the subway where a most ‘unchristian’ poison needle is a heart-attack inducing prick in the crowd that cannot be easily picked out of security video and so it is one more joins the people who drop dead of natural causes everyday, it’s that simple. Except when it is not that simple, as when the target is onto what is going on, because the intelligence agency is stupid.

When Americans flown in from the Midwest Bible Belt have been replaced by Israelis whose general demeanor, facial expression and body language is top to bottom different from the duped evangelicals (who should not, after-all, be surprised that actual Jews would be involved with their organization), it is not going to be missed by someone with my level of training. It was in Charlottenberg, I noticed it a couple of Israelis studying my habits, while it was Americans covered the larger public area I frequented, for a few days, and then it was Israelis had staked out my U-Bahn entry. I entered, but instead of going down a 2nd level and taking the train, I walked out another entrance, as though I was using the U-Bahn station as a method to cross an intersection without having to deal with above ground traffic lights and ‘walk’ signals, while watching for any tail I might pick up and sure enough… a tall Israeli in civilian clothes (no ‘Jews for Jesus’ shirt) reversed direction and emerged behind me but I was ready for this, and had positioned myself with back to wall at an outdoor café table, sandwiched between people also facing him with backs to wall and he could not hit me with his needle without giving himself away. Totally the wrong crowded scene, it was my advantage, not his. He stupidly studied my circumstance for a minute, hesitating, starting to leave, stopping to study again, wondering what to do while obviously completely out of sorts, gave up and left as I’d been looking steadily and directly at him and him at myself.

In August 2012, I moved to a small village in in the south of Germany.

Note 15) It was August, 2011, (REDACTED), who’d mostly gone out of contact with myself after I’d hand delivered the glass pellet captured by my hat in Wiesbaden, to be delivered for analysis, and followed on with delivering the incriminating Badger-Two Medicine file to him, came into contact just long enough to make excuse to terminate our close association (he accused me of writing “Hate” in reference to my satire compositions) of nearly twenty years. My impression is (REDACTED) had lost his nerve.

7

In November 2012, I visited Berlin and had a close encounter with a would be assassin on the U7 underground (3rd U7 attempt over 5 years), and this incident was the proverbial straw that broke the camel’s back.

By now, with 5+ years of German domestic authorities aware of and/or following my odyssey, with no action taken to pursue justice, no arrests, and no prosecutions, I came to realize there likely would be no action whatsoever taken, so long as a USA sycophant, conservative government ruled in Germany. After some period of reflection, I resolved to push back at the German government. I devised a legal strategy to bring a heat against Germany in the International Criminal Court for aiding and abetting the USA in crimes that the USA could not be prosecuted directly for, as the USA does not belong to the Rome Statute creating the court. I also resolved to push information on Christian extremism at the Pentagon, material I’d gained in informal cooperation with the Military Religious Freedom Foundation (since June, 2008), on German parliamentarians, together with the copious anti-Semitic hate mail directed against the foundation, provided to myself by Mikey Weinstein, MRFF president. These efforts began from my hideout in Southern Germany, in 2013.

Note 16) According to a Washington Post investigative report in 2011, “some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States. An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.”

This is bolstered by a bloomberg.com article: “Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency”

Additionally, the US Congressional watchdog GAO [Government Accounting Office] reports as a result of faulty data, US intelligence agencies: “are not well-positioned to assess the potential effects of relying on contractor personnel”

And then, a US Army Intelligence Officer stated to Buzzfeed: “I think if we had the chance, we would end it very quickly.” [USA intelligence would like to find Snowden] “Just casually walking on the streets of Moscow, coming back from buying his groceries. Going back to his flat and he is casually poked by a passerby. He thinks nothing of it at the time starts to feel a little woozy and thinks it’s a parasite from the local water. He goes home very innocently and next thing you know he dies in the shower.”

In fact most of the unlisted events (in this chronology) experienced by myself had to do with evading stalkers whose behaviors profiled for action as described in the paragraph preceding.

This points to the utter corruption of American intelligence, where a corrupt Pentagon, that has thrown the rule of law under the bus, and associated corrupt corporate personalities (e.g. Christian extremists Condoleezza Rice and former NATO Supreme Commander & Obama National Security Adviser General James Jones, in association with CHEVRON) can access top secret material via the Pentagon’s NSA (National Security Agency) for essentially any purpose they please, up to and inclusive of assassination.

8

2013 was mostly uneventful, relating to attempts on my life, working from my South German safe house. I managed to file the complaint with the International Criminal Court against Germany (presently on hold while the court waits for me to provide further information), and initiated a campaign to educate the German parliamentarians on the Pentagon led Christian extremism infecting NATO. In September 2013, I relocated to Leipzig. In December 2013, I left Germany to live with my girlfriend in (REDACTED.) We registered as living together and three weeks after, I was presented with an Ministry of Interior order expelling myself from the country. The order is in force throughout the European Union and consequently I am under daily threat of deportation to the USA. It is utterly immoral to force myself to seek political asylum in this circumstance but in fact that is precisely what may be required, in this ongoing travesty of justice where institutions of law have refused to move against the criminals I have exposed to the authorities.

9

The result of what I have named ‘alpha’ investigation is clear.

Corporate organized crime in the military-industrial complex fused with institutions in NATO and rogue elements in intelligence agencies (with the beyond Orwellian twist of ‘Christian Dominionism’ thrown in), together form an international ‘deep state’ dedicated to the subversion and eventual overthrow and/or control of western democratic institutions. The German government and law enforcement is now fully aware of ‘alpha’ elements that have operated exterior to the parameters of law in Germany. Incidental to this, alpha’s operational command and control centered in the USA has had the German political establishment intimidated at the highest levels.

With the German government well aware of all the necessary facts concerning ‘alpha’, from police at the local level to the top politicians in Germany, there is really little more to accomplish. The ‘alpha’ investigative result cannot stay swept under the rug indefinitely, too many people now know what is happening, and ultimately, I have little control over when it breaks into the open or how it will develop subsequently. This will have to do with any remaining institutions concerning the rule of law which have not yet been co-opted by the criminal enterprise behind ‘alpha.’ It is the undeniable responsibility of these institutions to take the information developed surrounding ‘alpha’ forward; towards restoration of an authentic constitutional order.

Note 17) In Germany, where there is no hesitation to arrest and prosecute Islamic terror cells bent on conspiracy to murder, four successive German Interior ministers have failed to act against the same behaviors when conducted by, or on behalf of, Christian extremists in American intelligence and associated corrupt personalities pursuing crimes on German soil. Those German Interior ministers, in order of tenure, are:

Wolfgang Schäuble, 22 November 2005 to 28 October 2009

Thomas de Maizière, 28 October 2009 to 3 March 2011

Hans-Peter Friedrich, 3 March 2011 to 17 December 2013

Thomas de Maizière, 17 December 2013 to present (2nd term)

-Ronald Thomas West, February 2014

Jeremy_Bentham

It were one Jeremy
Put a scare in thee
Stuffed wit straw
But for his maw
Menacing his posterity

Call him ‘The Headless Horseman’ of philosophers. Bentham arranged to have his skeleton padded with straw and stitched into his clothing .. where he’s since dwelled in a closet (for the past 183 years.) This is quite apropos as he was altogether unsuccessful when he’d sought to decriminalize homosexuality. Because his mummified head is too grotesque to gaze upon, it is kept locked away and does not attend those College of London council meetings where Bentham’s wax substitute for his dehydrated brains is perched on his bones and listed at roll call as ‘present but not voting.’

Like so many champions of modern democracy, for instance Barack Obama and David Cameron, Bentham espoused individual freedoms while in actual fact he’d been busy designing the precursor to our present day surveillance state:

The Panopticon is a type of institutional building designed by the English philosopher and social theorist Jeremy Bentham in the late 18th century. The concept of the design is to allow a single watchman to observe (-opticon) all (pan-) inmates of an institution without the inmates being able to tell whether or not they are being watched. Although it is physically impossible for the single watchman to observe all cells at once, the fact that the inmates cannot know when they are being watched means that all inmates must act as though they are watched at all times, effectively controlling their own behaviour constantly. The name is also a reference to Panoptes from Greek mythology; he was a giant with a hundred eyes and thus was known to be a very effective watchman

Jeremy Bentham had been the prime candidate for patron saint of the National Security Agency, that is until a debate arose; whether he’d been the inspiration for a shepherd’s sexual encounter with a body of straw stitched into a man’s clothing:

Scarecrow_sex

*

Perverts of Western Philosophy

The Satires

6 November 2021: re-titled,  rewritten, updated article HERE

The proposal in this essay “In fact it is perfectly possible by the time Snowden had traveled to Moscow with Harrison, he may no longer have been in possession of the documents at all” in fact had been almost immediately established as the case in fact, when Snowden stated he was no longer in possession of any NSA documents when he’d traveled to Russia, in his Moscow interview with NBC

It is a near impossible task to try and wipe egg off someone’s face, that is, if that someone doesn’t care to acknowledge the facts, if the facts shake their foundation in reality or they are simply willfully stubborn. When egg yolk has dried on ceramic, those of you who know how to wash dishes will know to use fingernails, or risk scratches and look for the steel wool. So this analysis is going to be abrasive to the idealists in the peace movement and associated journalists concerned with social justice. And it is an attempt to pull Glenn Greenwald’s chestnuts out of the fire, before they are reduced to ashes by counter-espionage and damage control spooks. Good luck with that, is the cynical admonition to myself, because this one might get eggs thrown at me with a vengeance.

Our present story begins precisely 11 months ago, 23 June 2013, when The Guardian had reported concerning the WikiLeaks supposed (reported widely in ‘mainstream’ media) ‘legal expert’ accompanying Edward Snowden, Sarah Harrison, on Snowden’s odyssey to Moscow:

“Despite her closeness to Assange, Harrison may seem a strange choice to accompany Snowden, as unlike several people close to WikiLeaks – most notably human rights lawyer Jennifer Robinson – Harrison has no legal qualifications or background”

Yeah, that’s likely why Snowden faxed perfectly useless asylum requests all over the world from the Moscow airport, not realizing (technically speaking, such as in an embassy) he had to be standing on the territory of the nation he would wish to acquire asylum in. But it gets by far more interesting. As I’d pointed out in my piece ‘WikiLeaks & Spy Agencies‘…

“In espionage [or counter-espionage], there are three basic means of penetrating and/or using a hostile organization to one’s advantage:

1)  Turning an employee through some means such as blackmail, sex, bribery or appeal to a psychological weakness such as working on someone’s conscience or ideology and convince them to become your organization’s asset (agent/traitor)

2)  Placing your own officer within the organization as an employee (spy)

3) Using psychology and disinformation to convince the organization’s staff to work to your advantage and/or commit acts against its own interests (false flag/sale)

Typically there would be each of these approaches assessed individually and in various combinations and/or variants when planning an operation. WikiLeaks would be vulnerable to this on several counts”

…now, we will look at this a bit more closely in a related development of the past several days.

On 19 May, 2014, the new venture of Greenwald (among others) ‘The Intercept’ published a piece based on the Snowden NSA documents, concerning MYSTIC sub-project SOMALGET, detailing how entire nations are being prepared for TOTAL surveillance of phone traffic, inclusive of all audio conversation. The apparent ‘pilot program’ of laboratory test animals is the Bahamas and an unnamed nation (in the intercept article.)

mystic_somalget_final

^NSA illustration via The Intercept

Almost immediately, Julian Assange (@WikiLeaks) and Greenwald were in a ‘twitter’ spat over Greenwald with-holding the 2nd nations name, Assange claiming Greenwald’s rationale for following long established journalism protocol to protect at risk persons by with-holding information was essentially selling out. AND THEN, WikiLeaks (Assange) threatened to reveal the nation’s name, if The Intercept and Greenwald refused to do so .. and subsequently named Afghanistan. What we see here, on its face, is brilliant counter-espionage work, of a nature so serious a threat to Greenwald (and others) journalism at The Intercept, as to appear to send Greenwald to Moscow to meet with Snowden, or so rumor would have it:

^Destination Moscow (in closing remarks by hostess)

The problem with WikiLeaks naming the unnamed country? Now, the ‘mainstream’ (CIA manipulated) media can claim in full on attack on Greenwald and the others at The Intercept, these journalists have no credibility insofar as security of content concerning the NSA documents in their possession. As well, there most certainly will be assessment of possibility to link Greenwald (and others at The Intercept) to any criminal case being developed against Assange. Touche, NSA! Counter-espionage has drawn blood.

Now to the question .. how did WikiLeaks acquire the name of Afghanistan? WikiLeaks isn’t saying. But first suspicion would naturally fall on close Assange confidant Sarah Harrison who’d been with Snowden ’24/7′ for weeks while Snowden was sorting out where he might be able to safely stay (having to ultimately settle on Russia.) I believe this is the least likely scenario, however we will go there first. It’s as simple as Sarah Harrison would have stole the documents from Snowden. If that were the case, WikiLeaks has all of the Snowden NSA disclosures and they don’t dare admit they’d violated Snowden’s trust. If Greenwald is indeed in Moscow meeting with Snowden, it would go to exploring this possibility. But I doubt this is what happened, not because WikiLeaks would not have stolen the documents if they could have, but because I expect Snowden was smart enough to secure the documents throughout Sarah Harrison’s stay with him, not every possible ‘honey-pot’ or using a woman in seduction for operational purposes is going to be successful. Whether Harrison were Assange’s mole or a British intelligence agent or double agent, Snowden was not a good candidate to fall for this sort of operation when it is demonstrable Snowden’s own girlfriend had no idea what he was  up to in the months and days leading up to his revelations and flight. The man is well disciplined in the rules of personal secrecy attending espionage. In fact it is perfectly possible by the time Snowden had traveled to Moscow with Harrison, he may no longer have been in possession of the documents at all. But the brilliant aspect of this, from the point of view of counter-espionage and exploiting public perception is, it will appear the documents were not secured and Greenwald & Laura Poitras can be pilloried as irresponsible and endangering the USA’s national security, inclusive of putting lives at risk, possibly to a point of building a criminal case. Meanwhile, if Greenwald had traveled to Moscow, he is barking up the wrong tree.

The more likely scenario is quite straightforward. The NSA arranged to ‘leak’ the information concerned to WikiLeaks, for clear intent of going after Greenwald and The Intercept with PsyOps, sowing distrust and misleading the principal players in a counter-operation that will be highly publicized propaganda.

So, one might ask, how can leaking the nation’s name, Afghanistan, almost certainly laundered via some CIA embed or ‘social justice’ source known to WikiLeaks, square with the USA purportedly concerned for the lives put at risk? Here is where the cynicism of evil plays in the world of spy craft; people at the top, certainly inclusive of Obama’s CIA Director John ‘Kill List‘ Brennan, NSA associates and ‘friends’ play the game of ‘trade-offs.’ The people whose lives are ‘at risk’ due to the disclosures will be relatively low level assets, easily expendable technicians. They are suddenly fodder for the greater gain of going after Greenwald and damaging The Intercept. It is actually as simple as that. If some of these technicians are killed, so much the better from the point of view at the top, that will be frosting on the cake of working to destroy (and likely pursue a frame-up with criminal charges) those persons who initially broke the Snowden story and facilitated the NSA documents release.

To Glenn & Co at The Intercept, welcome to the real world of spies.

Related stories:

Above Top Secret How (not) To Leak

WikiLeaks and Spy Agencies Probable information operations

This collection is aftermath of my interest in exploring the relationship between Intelligence Agencies & Wikipedia. Credit for the initial collection of links (which I occasionally update) goes to ‘the internet propagandist’ or an anonymous soul whose page had since disappeared. As may be determined from the wide range of dates of the articles, manipulation of the Western democracies population through social media, as well as spying on the people by military and intelligence agencies, is a very old phenomenon by ‘age of internet’ standards, essentially constantly upgraded over these past two decades:

Spent time searching the subject of who your facebook friends might be? Ever wonder what the intelligence agencies are up to with fake profiles? Driven mad at people who derail intelligent discussions? It’s simple folks. In information operations, the goal is to create people who ‘are what they think’ to the advantage of ‘the man behind the curtain.’ This collection should help lift the ‘cover’ ..

Your phone’s digital profiling creates your “surveillance score”

British information warfare officer is Twitter senior executive

The Pentagon’s plan to GPS your smartphone

The Crypto-Keepers by Yasha Levine (recommended)

https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties

US Army wants new AI tool for social media surveillance and analysis

Israel Sets Up Secret Firm With Top Ex-generals, Envoys for Online ‘Mass Awareness’ Campaign ‘To Fight Delegitimization’

On Fake News The Washington Post’s relationship to the CIA

Webcam monitoring employees

Hackers place images in apps and record your passwords via brain response with BCIs

The CIA’s ‘Pokémon Go’ App is Doing What the Patriot Act Can’t

The Pentagon’s secret pre-crime program to know your thoughts, predict your future

Operation Earnest Voice – CENTCOM military sock-puppets

Police Use of “Stingray” Cell Phone Surveillance Technology Spark Privacy Concerns

‘Beware’ the police tool that data mines your life

“This is No Longer Fiction” – The Era of Automatic Facial Recognition and Surveillance Is Here

Iris Scanners are Coming to College Campuses

Paul Ryan Sneaks Massive Surveillance Bill Into $1.1 Trillion Must Pass Spending Legislation

New UN Privacy Chief Proclaims – UK Digital Surveillance is “Worse than Orwell”

The Obama Administration is Forcing Local Cops to Stay Silent on Surveillance

Meet the Black Budget: The NSA’s Surveillance Business Model

Smart Phones & Tablets Spying On You

The Gentleperson’s Guide To Forum Spies

GCHQ hacks online polls (and much more)

New Snowden leak: “GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda”

New Zealand uses XKeyscore to spy on WTO candidate countries

DARPA Social Media in Strategic Communication (SMISC)

BBC News: US plans to ‘fight the net’ revealed

BBC News: Pentagon plans propaganda war

CENTCOM engages bloggers

WIRED: Air Force Releases ‘Counter-Blog’ Marching Orders

Military Report: Secretly ‘Recruit or Hire Bloggers’

Internet AstroTurfing by private companiesThe Guardian: Internet Astroturfing

Reddit: Downvote bots attached to specific accounts

Air Force ordered software to manage army of fake virtual people

HBGary: Automated social media management

Military contractors propose “false flag” attacks on opponents using fake documents

NPR: Report: U.S. Creates Fake Online Identities To Counter ‘Enemy Propaganda’

The Guardian: US spy operation to manipulate social media

The Guardian: The need to protect the internet from ‘astroturfing’ grows ever more urgent

Sentient World Simulation

Exposing Cyber Shills and Social Media’s Underworld

The Guardian: Israel organizes volunteers to flood the net with Israeli propaganda

The Guardian: Israel ups the stakes in the propaganda war

Israel To Pay Students For Pro-Israeli Social Media Propaganda

Jewish Internet Defense Force

Israeli Internet “Warfare Squad”

Israeli Megaphone Desktop Tool

Israelis hold presentations teaching each other how to “counteract anti Israeli” content on Wikipedia

camera.org media gatekeepers for the Israeli state

Turkey’s Government Forms 6,000-Member Social Media Team

egregious liar

egregious |iˈgrējəs| adjective: outstandingly bad; shocking: egregious abuse of trust.

liar |ˈlīər| noun: a person who tells lies.

Lest anyone mistake my use of this definition in regards to Obama’s speech on the NSA, I mean this in the sense Obama is really good at telling lies. Alternatively, Obama is a pathological liar:

pathological |ˌpaTHəˈläjikəl| (also pathologic)
adjective
compulsive; obsessive: a pathological liar.

The National Security blog “Unredacted’ had yesterday quickly published a refutation of Obama’s claims with an excellent piece on official lies relating to the NSA’s surveillance programs. I will take this bit of work a bit further, pointing out how the USA has become so far removed from the rule of law as to convince our constitution has been utterly, entirely usurped, and Obama’s pro-active, purposeful participation in this world-threatening travesty. But first, keep in the back of your mind: a compulsive liar must tell an ever growing web of lies to cover any previous lies. When the liar has been busted (as Obama has in the ‘Unredacted’ blog), lies never intended to see the light of day must be covered with ‘half-truths’ completely unintended to set matters straight (i.e. more lies.)

Obama on the FISA (secret) court, June 16, 2013: “It is transparent…So, on this telephone program, you’ve got a federal court with independent federal judges overseeing the entire program. And you’ve got Congress overseeing the program, not just the intelligence committee and not just the judiciary committee — but all of Congress had available to it before the last reauthorization exactly how this program works”

Unredacted: “OpentheGovernment.org’s 2013 Secrecy Report notes, “the unchecked expansion in the growth of the government’s surveillance programs is due in large measure to the absolute secrecy surrounding the FISC and how it is interpreting the law. The FISC’s opinions interpreting Section 215 of the PATRIOT Act has allowed for a much broader collection of data than most national security and civil liberties groups, and even some Members of Congress, understood the law to permit””

Obama, June 16, 2013: “What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails”

Unredacted: “the NSA has significant latitude to collect and keep the contents of e-mails and other communications of U.S. citizens that are swept up as part of the agency’s court-approved monitoring of a target overseas.” This information is stored, for up to five years, and can be accessed as soon as the FBI gets a National Security Letter, for which there are still no requirements to seek approval or judicial review when sending”

Other than exposure of egregious lies by Obama and his minions detailed at Unredacted, the problem I have with this is the lack of challenging the secret court per se. My own position is (as a former adjunct professor of American constitutional law), there is precisely ZERO constitutional authority granted to Congress to create a secret court in Article III, section I…

“The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may from time to time ordain and establish”

…because of the Fourth Amendment language…

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized”

…Fifth Amendment langauge…

“No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation”

…and the Sixth Amendment language…

“In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defense”

…with the provisions of these amendments trampled by the very existence of a secret court. All of the preceding constitutional clauses are violated by the very existence of the FISA law. Obama, who still holds a constitutional law professor position at the University of Chicago, and Chief Justice John Roberts, both, know this. What has happened is, what should be a nonexistent distinction has been created between ‘legal’ & ‘constitutional’ in the American body politic, when in fact they must be one and the same. Consequently, unconstitutional (illegal) national security laws are crafted by the congress, signed by the president and upheld by the courts, and this is how ‘color of law‘ is substituted in lieu of constitutional principles (while pretending the constitution holds sway.) Now we have, as a nation, come to accept the idea what is called ‘legal’ but is illegal, is constitutional, when in fact the national security law patently violates the constitution, a national oxymoron. The secret FISA (FISC) court John Roberts should refuse to recognize, but instead has sole authority to appoint judges to, epitomizes a ‘soft power’ coup created by congress, usurping our nation’s rule of law. And so it is Senators like Diane Feinstein can claim “PRISM is legal” while ignoring the constitution (never mind her oath to uphold the same.)

But in fact Obama and Roberts, both trained constitutional law attorneys, know there was never any necessity for a secret court having to do with ‘national security’ on account of a well known principle of American law:

in camera
adverb
‘in camera’ law in private, in particular taking place in the private chambers of a judge, with the press and public excluded: judges assess the merits of such claims in camera. The evidence of the state had been examined ‘in camera’ on national security grounds [‘in camera’, late Latin, ‘in the chamber.’]

If this known principle were applied in normal federal courts, a judge would have the discretion to reject secrecy based on her or his opinion the government’s claims of ‘national security’ were spurious, false or self-serving when balancing any national security claims against a person’s rights when pursuing eavesdropping authority (still unconstitutional in some circumstance perhaps, but by far more legal integrity is preserved because a judge can weigh a wider scope of evidence and chastise the government in open court for misbehaviors.) Obviously this will not do in any state well on its way to being usurped by fascism and is  why we have a patently unconstitutional & subversive secret court. Relevant to this run amok trashing of our foundational law:

While running a murder ring in government as vice president, international criminal Dick Cheney’s top lawyer was Shannen Coffin, Coffin is a close friend of Chief Justice John Roberts. John Roberts appoints the judges comprising the FISC (secret court.) Obama and his Attorney General Eric Holder have persistently refused to investigate and prosecute these criminal personalities, rather working to protect their interests, at the price of our foundational law (constitution’s) promises of personal liberties. Should you be asking yourself why?

Obama Attorney General Eric Holder’s Department of Justice includes the FBI which failed to investigate high profile drug cartel crimes tied directly to politicians in the USA under former Director Robert Mueller. Bush appointed Robert Mueller’s past includes stonewalling international narcotics money laundering investigations. Following on Robert Mueller, Obama appointment James Comey went from drug money laundering HSBC board director to FBI Director. What should we think about that?

Attorney General Holder had, in his past, arranged immunity for and to conceal the identities of corporate personalities responsible for providing cash and machine guns to a designated terror group:

“Holder himself, using his influence as former deputy attorney general under the Clinton Administration, helped to negotiate Chiquita’s sweeheart deal with the Justice Department in the criminal case against Chiquita. Under this deal, no Chiquita official received any jail time. Indeed, the identity of the key officials involved in the assistance to the paramilitaries were kept under seal and confidential”

And the Department of Justice’s FBI strategy:

“The FBI is committed to sharing timely, relevant, and actionable intelligence with …. the private sector as part of its national security and law enforcement missions”

Do you suppose this preceding means sharing intelligence with corporations? I expect so. So does Bloomberg:

“Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency”

And if this were not enough, recalling the NSA is essentially a branch of the Pentagon, what should we all think of the ultimate bosses of the organization comprising what is essentially a hyper-right-wing ‘Christian Taliban‘ ?

Huh. It would seem Obama is covering up a LOT. How much? Obama’s end run on our constitution, allowing the Pentagon’s NSA to hand the USA gift-wrapped to organized corporate crime in the military-industrial complex is the tip of the iceberg folks:

Deep State I Foundation article

Deep State II FBI complicity

Deep State III Heroin, Bags of Cash & the CIA

In other words, you cannot believe a word this man (who has bragged concerning extra-judicial assassinations “I’m really good at killing people“) says in his speech on the NSA eavesdropping. Snowden is not the criminal. The criminal is the President of the United States. Imagine his saying (he does) “For more than two centuries, our Constitution has weathered every type of change because we have been willing to defend it” included in his most recent litany of lies:

28 January 2014 update: less than two weeks after Obama’s direction the USA no longer hold the bulk records of American citizens’ communications, this weasel has already ordered an end-run on his words (to mollify) the USA populace in regards to the constitution (why would anyone be surprised?)

Obama’s speech [egregious lies] of 17 January 2014

At the dawn of our Republic, a small, secret surveillance committee borne out of the “The Sons of Liberty” was established in Boston. The group’s members included Paul Revere, and at night they would patrol the streets, reporting back any signs that the British were preparing raids against America’s early Patriots.

Throughout American history, intelligence has helped secure our country and our freedoms. In the Civil War, Union balloon reconnaissance tracked the size of Confederate armies by counting the number of camp fires. In World War II, code-breaking gave us insight into Japanese war plans, and when Patton marched across Europe, intercepted communications helped save the lives of his troops. After the war, the rise of the Iron Curtain and nuclear weapons only increased the need for sustained intelligence-gathering. And so, in the early days of the Cold War, President Truman created the National Security Agency to give us insight into the Soviet bloc, and provide our leaders with information they needed to confront aggression and avert catastrophe.

Throughout this evolution, we benefited from both our Constitution and traditions of limited government. U.S. intelligence agencies were anchored in our system of checks and balances – with oversight from elected leaders, and protections for ordinary citizens. Meanwhile, totalitarian states like East Germany offered a cautionary tale of what could happen when vast, unchecked surveillance turned citizens into informers, and persecuted people for what they said in the privacy of their own homes.

In fact even the United States proved not to be immune to the abuse of surveillance. In the 1960s, government spied on civil rights leaders and critics of the Vietnam War. Partly in response to these revelations, additional laws were established in the 1970s to ensure that our intelligence capabilities could not be misused against our citizens. In the long, twilight struggle against Communism, we had been reminded that the very liberties that we sought to preserve could not be sacrificed at the altar of national security.

If the fall of the Soviet Union left America without a competing superpower, emerging threats from terrorist groups, and the proliferation of weapons of mass destruction placed new – and, in some ways more complicated – demands on our intelligence agencies. Globalization and the Internet made these threats more acute, as technology erased borders and empowered individuals to project great violence, as well as great good. Moreover, these new threats raised new legal and policy questions. For while few doubted the legitimacy of spying on hostile states, our framework of laws was not fully adapted to prevent terrorist attacks by individuals acting on their own, or acting in small, ideologically driven groups rather than on behalf of a foreign power.

The horror of September 11th brought these issues to the fore. Across the political spectrum, Americans recognized that we had to adapt to a world in which a bomb could be built in a basement, and our electric grid could be shut down by operators an ocean away. We were shaken by the signs we had missed leading up to the attacks – how the hijackers had made phone calls to known extremists, and travelled to suspicious places. So we demanded that our intelligence community improve its capabilities, and that law enforcement change practices to focus more on preventing attacks before they happen than prosecuting terrorists after an attack.

It is hard to overstate the transformation America’s intelligence community had to go through after 9/11. Our agencies suddenly needed to do far more than the traditional mission of monitoring hostile powers and gathering information for policymakers – instead, they were asked to identify and target plotters in some of the most remote parts of the world, and to anticipate the actions of networks that, by their very nature, cannot be easily penetrated with spies or informants.

And it is a testimony to the hard work and dedication of the men and women in our intelligence community that over the past decade, we made enormous strides in fulfilling this mission. Today, new capabilities allow intelligence agencies to track who a terrorist is in contact with, and follow the trail of his travel or funding. New laws allow information to be collected and shared more quickly between federal agencies, and state and local law enforcement. Relationships with foreign intelligence services have expanded, and our capacity to repel cyber-attacks has been strengthened. Taken together, these efforts have prevented multiple attacks and saved innocent lives – not just here in the United States, but around the globe as well.

And yet, in our rush to respond to very real and novel threats, the risks of government overreach – the possibility that we lose some of our core liberties in pursuit of security – became more pronounced. We saw, in the immediate aftermath of 9/11, our government engaged in enhanced interrogation techniques that contradicted our values. As a Senator, I was critical of several practices, such as warrantless wiretaps. And all too often new authorities were instituted without adequate public debate.

Through a combination of action by the courts, increased congressional oversight, and adjustments by the previous Administration, some of the worst excesses that emerged after 9/11 were curbed by the time I took office. But a variety of factors have continued to complicate America’s efforts to both defend our nation and uphold our civil liberties.

First, the same technological advances that allow U.S. intelligence agencies to pin-point an al Qaeda cell in Yemen or an email between two terrorists in the Sahel, also mean that many routine communications around the world are within our reach. At a time when more and more of our lives are digital, that prospect is disquieting for all of us.

Second, the combination of increased digital information and powerful supercomputers offers intelligence agencies the possibility of sifting through massive amounts of bulk data to identify patterns or pursue leads that may thwart impending threats. But the government collection and storage of such bulk data also creates a potential for abuse.

Third, the legal safeguards that restrict surveillance against U.S. persons without a warrant do not apply to foreign persons overseas. This is not unique to America; few, if any, spy agencies around the world constrain their activities beyond their own borders. And the whole point of intelligence is to obtain information that is not publicly available. But America’s capabilities are unique. And the power of new technologies means that there are fewer and fewer technical constraints on what we can do. That places a special obligation on us to ask tough questions about what we should do.

Finally, intelligence agencies cannot function without secrecy, which makes their work less subject to public debate. Yet there is an inevitable bias not only within the intelligence community, but among all who are responsible for national security, to collect more information about the world, not less. So in the absence of institutional requirements for regular debate – and oversight that is public, as well as private – the danger of government overreach becomes more acute. This is particularly true when surveillance technology and our reliance on digital information is evolving much faster than our laws.

For all these reasons, I maintained a healthy skepticism toward our surveillance programs after I became President. I ordered that our programs be reviewed by my national security team and our lawyers, and in some cases I ordered changes in how we did business. We increased oversight and auditing, including new structures aimed at compliance. Improved rules were proposed by the government and approved by the Foreign Intelligence Surveillance Court. And we sought to keep Congress continually updated on these activities.

What I did not do is stop these programs wholesale – not only because I felt that they made us more secure; but also because nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens.

To the contrary, in an extraordinarily difficult job, one in which actions are second-guessed, success is unreported, and failure can be catastrophic, the men and women of the intelligence community, including the NSA, consistently follow protocols designed to protect the privacy of ordinary people. They are not abusing authorities in order to listen to your private phone calls, or read your emails. When mistakes are made – which is inevitable in any large and complicated human enterprise – they correct those mistakes. Laboring in obscurity, often unable to discuss their work even with family and friends, they know that if another 9/11 or massive cyber-attack occurs, they will be asked, by Congress and the media, why they failed to connect the dots. What sustains those who work at NSA through all these pressures is the knowledge that their professionalism and dedication play a central role in the defense of our nation.

To say that our intelligence community follows the law, and is staffed by patriots, is not to suggest that I, or others in my Administration, felt complacent about the potential impact of these programs. Those of us who hold office in America have a responsibility to our Constitution, and while I was confident in the integrity of those in our intelligence community, it was clear to me in observing our intelligence operations on a regular basis that changes in our technological capabilities were raising new questions about the privacy safeguards currently in place. Moreover, after an extended review of our use of drones in the fight against terrorist networks, I believed a fresh examination of our surveillance programs was a necessary next step in our effort to get off the open ended war-footing that we have maintained since 9/11. For these reasons, I indicated in a speech at the National Defense University last May that we needed a more robust public discussion about the balance between security and liberty. What I did not know at the time is that within weeks of my speech, an avalanche of unauthorized disclosures would spark controversies at home and abroad that have continued to this day.

Given the fact of an open investigation, I’m not going to dwell on Mr. Snowden’s actions or motivations. I will say that our nation’s defense depends in part on the fidelity of those entrusted with our nation’s secrets. If any individual who objects to government policy can take it in their own hands to publicly disclose classified information, then we will never be able to keep our people safe, or conduct foreign policy. Moreover, the sensational way in which these disclosures have come out has often shed more heat than light, while revealing methods to our adversaries that could impact our operations in ways that we may not fully understand for years to come.

Regardless of how we got here, though, the task before us now is greater than simply repairing the damage done to our operations; or preventing more disclosures from taking place in the future. Instead, we have to make some important decisions about how to protect ourselves and sustain our leadership in the world, while upholding the civil liberties and privacy protections that our ideals – and our Constitution – require. We need to do so not only because it is right, but because the challenges posed by threats like terrorism, proliferation, and cyber-attacks are not going away any time soon, and for our intelligence community to be effective over the long haul, we must maintain the trust of the American people, and people around the world.

This effort will not be completed overnight, and given the pace of technological change, we shouldn’t expect this to be the last time America has this debate. But I want the American people to know that the work has begun. Over the last six months, I created an outside Review Group on Intelligence and Communications Technologies to make recommendations for reform. I’ve consulted with the Privacy and Civil Liberties Oversight Board. I’ve listened to foreign partners, privacy advocates, and industry leaders. My Administration has spent countless hours considering how to approach intelligence in this era of diffuse threats and technological revolution. And before outlining specific changes that I have ordered, let me make a few broad observations that have emerged from this process.

First, everyone who has looked at these problems, including skeptics of existing programs, recognizes that we have real enemies and threats, and that intelligence serves a vital role in confronting them. We cannot prevent terrorist attacks or cyber-threats without some capability to penetrate digital communications – whether it’s to unravel a terrorist plot; to intercept malware that targets a stock exchange; to make sure air traffic control systems are not compromised; or to ensure that hackers do not empty your bank accounts.

Moreover, we cannot unilaterally disarm our intelligence agencies. There is a reason why blackberries and I-Phones are not allowed in the White House Situation Room. We know that the intelligence services of other countries – including some who feign surprise over the Snowden disclosures – are constantly probing our government and private sector networks, and accelerating programs to listen to our conversations, intercept our emails, or compromise our systems. Meanwhile, a number of countries, including some who have loudly criticized the NSA, privately acknowledge that America has special responsibilities as the world’s only superpower; that our intelligence capabilities are critical to meeting these responsibilities; and that they themselves have relied on the information we obtain to protect their own people.

Second, just as ardent civil libertarians recognize the need for robust intelligence capabilities, those with responsibilities for our national security readily acknowledge the potential for abuse as intelligence capabilities advance, and more and more private information is digitized. After all, the folks at NSA and other intelligence agencies are our neighbors and our friends. They have electronic bank and medical records like everyone else. They have kids on Facebook and Instagram, and they know, more than most of us, the vulnerabilities to privacy that exist in a world where transactions are recorded; emails and text messages are stored; and even our movements can be tracked through the GPS on our phones.

Third, there was a recognition by all who participated in these reviews that the challenges to our privacy do not come from government alone. Corporations of all shapes and sizes track what you buy, store and analyze our data, and use it for commercial purposes; that’s how those targeted ads pop up on your computer or smartphone. But all of us understand that the standards for government surveillance must be higher. Given the unique power of the state, it is not enough for leaders to say: trust us, we won’t abuse the data we collect. For history has too many examples when that trust has been breached. Our system of government is built on the premise that our liberty cannot depend on the good intentions of those in power; it depends upon the law to constrain those in power.

I make these observations to underscore that the basic values of most Americans when it comes to questions of surveillance and privacy converge far more than the crude characterizations that have emerged over the last several months. Those who are troubled by our existing programs are not interested in a repeat of 9/11, and those who defend these programs are not dismissive of civil liberties. The challenge is getting the details right, and that’s not simple. Indeed, during the course of our review, I have often reminded myself that I would not be where I am today were it not for the courage of dissidents, like Dr. King, who were spied on by their own government; as a President who looks at intelligence every morning, I also can’t help but be reminded that America must be vigilant in the face of threats.

Fortunately, by focusing on facts and specifics rather than speculation and hypotheticals, this review process has given me – and hopefully the American people – some clear direction for change. And today, I can announce a series of concrete and substantial reforms that my Administration intends to adopt administratively or will seek to codify with Congress.

First, I have approved a new presidential directive for our signals intelligence activities, at home and abroad. This guidance will strengthen executive branch oversight of our intelligence activities. It will ensure that we take into account our security requirements, but also our alliances; our trade and investment relationships, including the concerns of America’s companies; and our commitment to privacy and basic liberties. And we will review decisions about intelligence priorities and sensitive targets on an annual basis, so that our actions are regularly scrutinized by my senior national security team.

Second, we will reform programs and procedures in place to provide greater transparency to our surveillance activities, and fortify the safeguards that protect the privacy of U.S. persons. Since we began this review, including information being released today, we have declassified over 40 opinions and orders of the Foreign Intelligence Surveillance Court, which provides judicial review of some of our most sensitive intelligence activities – including the Section 702 program targeting foreign individuals overseas and the Section 215 telephone metadata program. Going forward, I am directing the Director of National Intelligence, in consultation with the Attorney General, to annually review – for the purpose of declassification – any future opinions of the Court with broad privacy implications, and to report to me and Congress on these efforts. To ensure that the Court hears a broader range of privacy perspectives, I am calling on Congress to authorize the establishment of a panel of advocates from outside government to provide an independent voice in significant cases before the Foreign Intelligence Surveillance Court.

Third, we will provide additional protections for activities conducted under Section 702, which allows the government to intercept the communications of foreign targets overseas who have information that’s important for our national security. Specifically, I am asking the Attorney General and DNI to institute reforms that place additional restrictions on government’s ability to retain, search, and use in criminal cases, communications between Americans and foreign citizens incidentally collected under Section 702.

Fourth, in investigating threats, the FBI also relies on National Security Letters, which can require companies to provide specific and limited information to the government without disclosing the orders to the subject of the investigation. These are cases in which it is important that the subject of the investigation, such as a possible terrorist or spy, isn’t tipped off. But we can – and should – be more transparent in how government uses this authority. I have therefore directed the Attorney General to amend how we use National Security Letters so this secrecy will not be indefinite, and will terminate within a fixed time unless the government demonstrates a real need for further secrecy. We will also enable communications providers to make public more information than ever before about the orders they have received to provide data to the government.

This brings me to program that has generated the most controversy these past few months – the bulk collection of telephone records under Section 215. Let me repeat what I said when this story first broke – this program does not involve the content of phone calls, or the names of people making calls. Instead, it provides a record of phone numbers and the times and lengths of calls – meta-data that can be queried if and when we have a reasonable suspicion that a particular number is linked to a terrorist organization.

Why is this necessary? The program grew out of a desire to address a gap identified after 9/11. One of the 9/11 hijackers – Khalid al-Mihdhar – made a phone call from San Diego to a known al Qaeda safe-house in Yemen. NSA saw that call, but could not see that it was coming from an individual already in the United States. The telephone metadata program under Section 215 was designed to map the communications of terrorists, so we can see who they may be in contact with as quickly as possible. This capability could also prove valuable in a crisis. For example, if a bomb goes off in one of our cities and law enforcement is racing to determine whether a network is poised to conduct additional attacks, time is of the essence. Being able to quickly review telephone connections to assess whether a network exists is critical to that effort.

In sum, the program does not involve the NSA examining the phone records of ordinary Americans. Rather, it consolidates these records into a database that the government can query if it has a specific lead – phone records that the companies already retain for business purposes. The Review Group turned up no indication that this database has been intentionally abused. And I believe it is important that the capability that this program is designed to meet is preserved.

Having said that, I believe critics are right to point out that without proper safeguards, this type of program could be used to yield more information about our private lives, and open the door to more intrusive, bulk collection programs. They also rightly point out that although the telephone bulk collection program was subject to oversight by the Foreign Intelligence Surveillance Court and has been reauthorized repeatedly by Congress, it has never been subject to vigorous public debate.

For all these reasons, I believe we need a new approach. I am therefore ordering a transition that will end the Section 215 bulk metadata program as it currently exists, and establish a mechanism that preserves the capabilities we need without the government holding this bulk meta-data.

This will not be simple. The Review Group recommended that our current approach be replaced by one in which the providers or a third party retain the bulk records, with the government accessing information as needed. Both of these options pose difficult problems. Relying solely on the records of multiple providers, for example, could require companies to alter their procedures in ways that raise new privacy concerns. On the other hand, any third party maintaining a single, consolidated data-base would be carrying out what is essentially a government function with more expense, more legal ambiguity, and a doubtful impact on public confidence that their privacy is being protected.

During the review process, some suggested that we may also be able to preserve the capabilities we need through a combination of existing authorities, better information sharing, and recent technological advances. But more work needs to be done to determine exactly how this system might work.

Because of the challenges involved, I’ve ordered that the transition away from the existing program will proceed in two steps. Effective immediately, we will only pursue phone calls that are two steps removed from a number associated with a terrorist organization instead of three. And I have directed the Attorney General to work with the Foreign Intelligence Surveillance Court so that during this transition period, the database can be queried only after a judicial finding, or in a true emergency.

Next, I have instructed the intelligence community and Attorney General to use this transition period to develop options for a new approach that can match the capabilities and fill the gaps that the Section 215 program was designed to address without the government holding this meta-data. They will report back to me with options for alternative approaches before the program comes up for reauthorization on March 28. During this period, I will consult with the relevant committees in Congress to seek their views, and then seek congressional authorization for the new program as needed.

The reforms I’m proposing today should give the American people greater confidence that their rights are being protected, even as our intelligence and law enforcement agencies maintain the tools they need to keep us safe. I recognize that there are additional issues that require further debate. For example, some who participated in our review, as well as some in Congress, would like to see more sweeping reforms to the use of National Security Letters, so that we have to go to a judge before issuing these requests. Here, I have concerns that we should not set a standard for terrorism investigations that is higher than those involved in investigating an ordinary crime. But I agree that greater oversight on the use of these letters may be appropriate, and am prepared to work with Congress on this issue. There are also those who would like to see different changes to the FISA court than the ones I have proposed. On all of these issues, I am open to working with Congress to ensure that we build a broad consensus for how to move forward, and am confident that we can shape an approach that meets our security needs while upholding the civil liberties of every American.

Let me now turn to the separate set of concerns that have been raised overseas, and focus on America’s approach to intelligence collection abroad. As I’ve indicated, the United States has unique responsibilities when it comes to intelligence collection. Our capabilities help protect not only our own nation, but our friends and allies as well. Our efforts will only be effective if ordinary citizens in other countries have confidence that the United States respects their privacy too. And the leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them, rather than turning to surveillance. In other words, just as we balance security and privacy at home, our global leadership demands that we balance our security requirements against our need to maintain trust and cooperation among people and leaders around the world.

For that reason, the new presidential directive that I have issued today will clearly prescribe what we do, and do not do, when it comes to our overseas surveillance. To begin with, the directive makes clear that the United States only uses signals intelligence for legitimate national security purposes, and not for the purpose of indiscriminately reviewing the emails or phone calls of ordinary people. I have also made it clear that the United States does not collect intelligence to suppress criticism or dissent, nor do we collect intelligence to disadvantage people on the basis of their ethnicity, race, gender, sexual orientation, or religious beliefs. And we do not collect intelligence to provide a competitive advantage to U.S. companies, or U.S. commercial sectors.

In terms of our bulk collection of signals intelligence, U.S. intelligence agencies will only use such data to meet specific security requirements: counter-intelligence; counter-terrorism; counter-proliferation; cyber-security; force protection for our troops and allies; and combating transnational crime, including sanctions evasion. Moreover, I have directed that we take the unprecedented step of extending certain protections that we have for the American people to people overseas. I have directed the DNI, in consultation with the Attorney General, to develop these safeguards, which will limit the duration that we can hold personal information, while also restricting the use of this information.

The bottom line is that people around the world – regardless of their nationality – should know that the United States is not spying on ordinary people who don’t threaten our national security, and that we take their privacy concerns into account. This applies to foreign leaders as well. Given the understandable attention that this issue has received, I have made clear to the intelligence community that – unless there is a compelling national security purpose – we will not monitor the communications of heads of state and government of our close friends and allies. And I’ve instructed my national security team, as well as the intelligence community, to work with foreign counterparts to deepen our coordination and cooperation in ways that rebuild trust going forward.

Now let me be clear: our intelligence agencies will continue to gather information about the intentions of governments – as opposed to ordinary citizens – around the world, in the same way that the intelligence services of every other nation does. We will not apologize simply because our services may be more effective. But heads of state and government with whom we work closely, and on whose cooperation we depend, should feel confident that we are treating them as real partners. The changes I’ve ordered do just that.

Finally, to make sure that we follow through on these reforms, I am making some important changes to how our government is organized. The State Department will designate a senior officer to coordinate our diplomacy on issues related to technology and signals intelligence. We will appoint a senior official at the White House to implement the new privacy safeguards that I have announced today. I will devote the resources to centralize and improve the process we use to handle foreign requests for legal assistance, keeping our high standards for privacy while helping foreign partners fight crime and terrorism.

I have also asked my Counselor, John Podesta, to lead a comprehensive review of big data and privacy. This group will consist of government officials who—along with the President’s Council of Advisors on Science and Technology—will reach out to privacy experts, technologists and business leaders, and look at how the challenges inherent in big data are being confronted by both the public and private sectors; whether we can forge international norms on how to manage this data; and how we can continue to promote the free flow of information in ways that are consistent with both privacy and security.

For ultimately, what’s at stake in this debate goes far beyond a few months of headlines, or passing tensions in our foreign policy. When you cut through the noise, what’s really at stake is how we remain true to who we are in a world that is remaking itself at dizzying speed. Whether it’s the ability of individuals to communicate ideas; to access information that would have once filled every great library in every country in the world; or to forge bonds with people on other sides of the globe, technology is remaking what is possible for individuals, for institutions, and for the international order. So while the reforms that I have announced will point us in a new direction, I am mindful that more work will be needed in the future.

One thing I’m certain of: this debate will make us stronger. And I also know that in this time of change, the United States of America will have to lead. It may seem sometimes that America is being held to a different standard, and the readiness of some to assume the worst motives by our government can be frustrating. No one expects China to have an open debate about their surveillance programs, or Russia to take the privacy concerns of citizens into account. But let us remember that we are held to a different standard precisely because we have been at the forefront in defending personal privacy and human dignity.

As the nation that developed the Internet, the world expects us to ensure that the digital revolution works as a tool for individual empowerment rather than government control. Having faced down the totalitarian dangers of fascism and communism, the world expects us to stand up for the principle that every person has the right to think and write and form relationships freely – because individual freedom is the wellspring of human progress.

Those values make us who we are. And because of the strength of our own democracy, we should not shy away from high expectations. For more than two centuries, our Constitution has weathered every type of change because we have been willing to defend it, and because we have been willing to question the actions that have been taken in its defense. Today is no different. Together, let us chart a way forward that secures the life of our nation, while preserving the liberties that make our nation worth fighting for. Thank you

^ None of what Obama has stated, can be believed

*

%d bloggers like this: