Archives for posts with tag: NSA

“The extension of the empire has meant the growth of private fortunes. This is nothing new, indeed it is in keeping with the most ancient history” -Gaius Asinius Gallus (from Tacitus, The Annals of Imperial Rome)

Sociopaths & Democracy

Economics & Counter-Insurgency

Raphaels’ Paradox ‘civilized’ malignant narcissism

A + B = C (1) Plato, Nassim Taleb & Daniel Kahneman

A + B = C (2) rationality as a progenitor of chaos

A + B = C (3) Indians vs Plato, CIA & Stargate Project

A Tribal Perspective

Leadership in Time of Crisis

Reality Check

The Alpha Chronology Story of my exile

If you find this next essay offensive, I find the criminality at the center of the events it describes much more offensive than the terms used in the narration. In any case, it’s not everyday you’ll find an obscene poetic essay applied to the obscenities that constitute our intelligence agencies:

When The Enemy Of Your Friend Is Your Favorite F**K

“We hang the petty thieves and appoint the great ones to public office” -Aesop

-under construction-

Black_site_ships - 1 (1)

Ghost ship. A ‘ghost’ prisoner’s fate is no better

The CIA versus NSA (Pentagon) internecine war ticks up a notch with CIA presstitute AP snitching out the Pentagon’s torture ‘black sites’ on ships:

“THE SHIPS”

“Several inmates said guards frequently threatened prisoners by saying they would “take them to the ships.”

“Senior U.S. defense officials flatly denied the U.S. military conducts any interrogations of Yemenis on any ships.

“We have no comment on these specific claims,” said Jonathan Liu, a CIA spokesman, adding that any allegations of abuse are taken seriously.

“But a Yemeni officer told AP he had worked on a vessel off the coast where he saw at least two detainees brought for questioning.

“He said the detainees were taken below deck, where he was told American “polygraph experts” and “psychological experts” conducted interrogations. He did not have access to the lower decks and thus had no first-hand information about what happened there. But he said he saw other Americans in uniforms on the ship. The officer spoke on condition of anonymity because he feared retaliation for discussing the operations.

“A second Yemeni officer said he was involved in moving detainees to a ship, where he said he saw foreigners though he didn’t know their nationality. “They say these are the important ones. Why are they important? I have no idea,” he said of the detainees.

“A top official in Hadi’s Interior Ministry and a senior military official in the 1st Military District, based in Hadramawt, also contended that Americans were conducting interrogations at sea, as did a former senior security official in Hadramawt. The three men spoke to the AP on condition of anonymity because they were not authorized to share military information”

No doubt the American public will see this as some revelation but actually this old news:

Black_site_ships - 1

Obama didn’t actually close down black site prisons, he merely relocated them to preexisting black site ships run by the military. This (above screenshot) article is from 2010:

“U.S. PRISON SHIPS: On June 2, 2008 UK’s Guardian reported, “The US has admitted that the Bataan and Peleliu were used as prison ships between December 2001 and January 2002”. According to Reprieve, the U.S. may have used 17 ships as “floating prisons” since 2001. Detainees are interrogated on ships and may be rendered to other, undisclosed locations. Reprieve expressed concern over the time the U.S.S. Ashland spent off Somalia in early 2007. According to The Guardian, “At this time many people were abducted by Somali, Kenyan and Ethiopian forces in a systematic operation involving regular interrogations by individuals believed to be members of the FBI and CIA. Ultimately more than 100 individuals were ‘disappeared’ to prisons in locations including Kenya, Somalia, Ethiopia, Djibouti and Guantanamo Bay. Reprieve believes prisoners may have also been held for interrogation on the USS Ashland and other ships in the Gulf of Aden during this time.”

The U.S. Navy, through a spokesman, said, “There are no detention facilities on US navy ships” but Commander Jeffrey Gordon told The Guardian some individuals had been put on ships “for a few days” during initial days of detention.

Reprieve quoted one prisoner released from Guantanamo who was on one of the U.S. ships who said there were 50 other prisoners in cages in the bottom of the ship and they were beaten even more severely than in Guantanamo. Clive Stafford Smith, Reprieve’s legal director, is quoted as saying, “They choose ships to try to keep their misconduct as far as possible from the prying eyes of the media and lawyers. We will eventually reunite these ghost prisoners with their legal rights”

Well, good luck with ‘reuniting’ those ‘ghost’ prisoners with their families, recalling it was Henry Kissinger mentored the South American military strongmen who ‘disappeared’ tens of thousands of ‘suspected’ leftists. The relevance? Multiple tens of thousands of ‘ghost’ prisoners remain unaccounted for, of the estimated 100,000 or so ‘renditioned’ prisoners directly related to the USA’s war on terror. The real news is, it would appear those prisoners who aren’t ‘outsourced’ but meet ‘importance’ criteria enough to be sent to ‘The Ships” are disappeared and don’t come back. How many? This, on top of renditions math that doesn’t add up, the ‘lie by omission’ the AP is never going to admit (if only because it gets sticky, in that case, for the CIA, not only the Pentagon.) Adding ‘The Ships’ to the known CIA renditions flights, we ALL can know the Feinstein torture investigation had been little more than a whitewash.

Here’s my article on the renditions math from December, 2014:

122 KNOWN aircraft were used in renditions within a database of 11,000 flights (by those aircraft) during the known period of renditions. With 119 ‘detained suspects’ acknowledged in Feinstein’s ‘torture report’, the first problem we see is, there are more planes known to have renditioned people than the ‘torture report’ admits had been renditioned. Ignoring the idea the CIA had required use of a separate plane for each rendition (+3 planes), the initial math comes out to 92 flights per prisoner. Let’s toss 1/2 the flights and we have 46 flights per prisoner. Let’s toss 1/2 the flights again, and we have 23 flights per prisoner. Ok, so now we’ve thrown out 75% of the flights by known renditions aircraft and that works out to 25% of the flights would amount to renditions of 2,750 prisoners. So, let’s cut that by half again; if 12.5% of the known flights were renditions, there would be 1,375 kidnapped and or captured persons flown by the CIA. Cut in half again, to 6.25% of flights by planes known to fly renditions, and we should have 688 involuntary ‘transportees.’ If 3% of the flights by KNOWN renditions aircraft, were transporting ONE prisoner each, depending on number of stops, we’d still have up to 344 people (versus Feinstein’s 119), relating to the CIA renditions.

The disparity of the math is too great to give any sense of  credibility or reliability to the Feinstein report. And there is no present way of determining whether flights ‘disappearing’ people (dumped at sea) had been employed in the (CIA supported) Latin America junta style.

Now, it stands to reason we don’t have close to all of the planes and flights identified because many of them would have been military. As well, we know the American military has not been even close to fully probed over its own ‘black site’ torture centers, this documentary film’s existence (suppressed in American media) is a singular example:

How many people are missing? We’ll never know so long as the people perpetrating the crimes (CIA-U.S. military) are the people providing access to the information, such as the CIA had in the case of the Feinstein probe. The Feinstein ‘torture report’ can be little more than a ‘we’ll acknowledge as little as possible’ white-wash or professional psychological operation employed for purpose of damage control.

There needs to be an authentic accounting. Most or nearly all flights that weren’t to ‘black sites’ were likely military flights to, examples given, Bagram and Guantanamo. The point of using civilian jets together with filing false flight plans is to cover criminal activity such as kidnap renditions. A civilian jet points to a kidnap rendition or less often, someone handed over by a 3rd party, for instance Pakistan, as opposed to a battlefield capture. What are the structures? Aside from inferred CIA black sites in the  Senate report identified from other sources (Poland, Romania et al) it is known prisoners were delivered for torture to 3d party nations Morocco, Jordan, Syria, Egypt and Libya, there was a ‘black site’ under military control at Bagram and there well may have been a ‘black site’ at Guantanamo separate from the regular detention facility, not to mention strong indicators pointing to Diego Garcia. As well, I’ve seen reports Special Forces in Afghanistan, working with CIA, had numerous small (off record) detention facilities in remote areas where prisoners had been shell-gamed to evade rules, and reports of black site jails on U.S. navy ships. Also there are indications renditions had been reduced in favor of stepped up assassinations under Obama. The subject of renditions is a longs ways from broken open in any sense of reality.

And there is a large question yet looms .. ‘what had been the fate of the women prisoners’ ?

June Notes, Week Three the 3rd soap installment

June Notes, Week Two spooks & USA infrastructure

June Notes, Week One weapons sales, media whores & more

Related:

“We Tortured Some Folks”

Reorganizing Murder Inc

*

A Sociopaths & Democracy project

*

b10

MP Stroebele (Ron West photo)

Dear MP Stroebele

As you are now aware, and this cannot be denied with the recent news coverage naming yourself…

http://www.washingtonpost.com/world/europe/nsa-scandal-rekindles-in-germany-with-an-ironic-twist/2015/04/30/030ec9e0-ee7e-11e4-8050-839e9234b303_story.html

…the German parliament has been deceived by rank criminals in the Merkel government.

Therefore you can no longer offer any excuses (in the form of your ongoing, and cowardly silence) for refusing to bring my case forward, particularly when you state to media:

““It will be extremely embarrassing for Merkel, who prides herself on her close relationship with [French President Francois] Hollande, if it turns out that the BND helped the NSA to spy on French politicians. Obama knows the feeling,” said Hans-Christian Ströbele, a member of the parliamentary intelligence control panel from the Green Party”

Is ‘embarrassment’ excuse enough to continue covering up BND or other parties in German government complicity in concealing, and perhaps even assisting, attempted murders on German soil? I will draw your attention to our meeting in Berlin at the Snowden rally in July of 2013:

https://ronaldthomaswest.com/2013/07/09/reflections-on-a-snowden-rally-2/

Mr MP Stroebele, I would very much like to get on with the normal life I am entitled to, as an ordinary citizen who has committed no crimes. You OWE that to both justice and to myself. It is past time to bring my case forward.

Regards

Ron West

http://ronaldthomaswest.com

“The history of the great events of this world are scarcely more than a history of crime” -Voltaire

A story of how defending Native American sacred lands had morphed, over a period of 20+ years, into a game of international intrigue & surviving assassination; with conclusions

Chronology of Events in the Case of Ronald Thomas West
(abridged summary)

1

In 1987 I was asked by Floyd Heavyrunner, traditional war chief of the Blackfoot Indians of Montana, to monitor interest by United States Department of Agriculture (Forest Service) in development of oil and natural gas in the Blackfeet tribe’s treaty lands known as the ‘Badger-Two-Medicine’ also known as the ‘Ceded Strip’, subject to tribal rights under the so-called ‘Grinnell Agreement’ also known as the ‘Treaty of 1895.’

In 1988, Floyd retained Mark Mueller of Austin, Texas (licensed in Montana) as attorney of record for the Blackfoot ‘Brave Dogs Society’ also known as the ‘Crazy Dogs’, in Floyd’s capacity as traditional cultural leader of that ancient tribal organization.

By 1991, as lead investigator on behalf of the Brave Dogs Society, in association with Mark Mueller, I had developed copious documentary evidence of a criminal ring working inside the United States Department of Agriculture, on behalf of CHEVRON Corporation, detailing a concerted effort to counterfeit compliance to laws that otherwise should have protected the area on behalf of the Brave Dogs Society, to include officials of the United States pursuing the following illegal acts, including felonies:

Lying to the Brave Dogs and counsel

Lying to the public

Lying to Congress about following specific applicable laws (National Historic Preservation Act ‘traditional cultural properties)

Concealing Forest Service knowledge of those applicable laws from the Brave Dogs, counsel and the public

Concealing Forest Service officials training in those same applicable laws

Deliberately cheating those same laws, to the benefit of CHEVRON

These incriminating documents, taken together, indicate a pervasive and organized criminal network represented in government officials, working on behalf of CHEVRON for the purpose of deliberately counterfeiting compliance to law, going to the highest levels of the United States at Washington DC. This particular criminal event was organized and run out of the Northern Region One Headquarters of the United States Forest Service at Missoula, Montana, and implemented via the Great Falls, Montana, offices of the Lewis and Clark National Forest.

These documents were incorporated into administrative appeal when the CHEVRON (and FINA) permits to drill were approved in what amounted to a ‘rubber stamp’ process at the Northern Region One Headquarters at Missoula. This appeal stopped the project in its tracks. The quandary of coving up the criminal network was accomplished by bureaucratic fiat, when the FBI declined to become involved (I personally briefed an agent who reviewed the documentation and acknowledged their substance but claimed he had no authorization to act and referred to the United States Attorney (United States Department of Justice) office at Billings, Montana, whom he stated were very well aware of the issues), after the United States Department of Agriculture Inspector General declined to investigate, the USDA Inspector General’s office saying they would not become involved on the pretext of the issue had already been raised in the administrative appeals process. Because the government (and Chevron) did not dare to allow the documents into the federal court record, where they would be put in front of a judge (or judges, on appeals in court litigation), a political deal involving lease swaps was engineered by United States Senator Max Baucus with CHEVRON and CHEVRON backed out. When I personally managed to place the incriminating documents into the hands of (recently new) Forest Service Chief Floyd Thomas, he attempted to close down the Northern Region One Headquarters and move those operations to Denver, where they ‘would fall under closer supervision.’ It took the efforts of two United States Senators, Max Baucus and Conrad Burns, to reverse this.

Note 1) REDACTED

Note 2) Two attorneys briefing the government side (Forest Service) on Native legal issues during this period, John Yoo & Jay Bybee, would later become infamous as Bush ‘torture lawyers’ in association with Condoleezza Rice. Condoleezza Rice, in turn, has had (previous and post Bush regime) close association with CHEVRON.

Note 3) the Montana ‘Northern Region One’ headquarters has a long association with CIA, dating to the 1950s and still an active relationship into the 1970s and probably through 1980s and beyond, relating to air services, surplus property, and laundering aircraft used in agency gun running & rogue elements (black budget) international narcotics trafficking.

Note 4) Immediately following my investigative result in 1991, revealing the criminal ring inside government working for CHEVRON, the Veterans Administration suddenly, spuriously, diagnosed me as suffering “Psychosis.” I managed to undo this by independently having myself evaluated by the same medical center used by the VA to to study schizophrenia and came up clean.

Note 5) Following this, my VA records were reviewed by a ‘specialist’ from Washington, DC, and certain documents vanished, making it appear as though I had defrauded the VA. A hearing was scheduled, where I produced a copy of a missing critical document, necessary to my defense, and the hearing was cancelled on the spot and charges dismissed.

Note 6) In 1998 I resigned from employ with Mueller Law office on account of health issues.

2

In 2001, I relocated, from West Glacier, Montana, to Sandia Park, New Mexico. After, I had enrolled my youngest son in the East Mountain High School (a charter school), an accelerated learning institution, in the late Summer of 2005. This school happened to have significant ties to powerful personalities in the Albuquerque corporate military-industrial complex.

By late Fall, intense pressure had been initiated, in form of undue harassment, it would appear intended to make us quit the school.

I initiated a ‘pro se’ investigation, to uncover the core reason(s.) In the process of this, what had been uncovered by myself were:

Felonies tied to the school’s pattern and pervasive civil rights violations of minority students particularly, and other students, by undue influence of ultra right-wing, racist, ‘Christian Dominion’ personalities.

What appears on its face to be an American charter school (EMHS) with embedded intelligence agents employed as instructors.

The possible use of school sponsored ‘field trips abroad’ as cover for covert operations in Latin America and Europe.

Meanwhile I had caused a parallel investigation (late 2006 into Spring 2007) into the school’s illegal activities, by a member of the school’s governing council, Jim Healy, in regards to harassment of my son and myself. In the course of this second (parallel) investigation by governing council member Jim Healy, I was approached by another governing council member, David Walter, who informed me I was stepping on toes of members of “The Council on Foreign Relations” and warned me (a threat) “Do not dare involve attorneys.” Walter further stated any action to hold the school accountable “Had no chance” under any circumstance. In less than a year, a teacher (intelligence embed, almost certainly CIA) from the school, Vince Langan, was part of a team that attempted to ambush myself in Berlin.

With the East Mountain High School case unresolved, recently divorced, my home sold and my youngest off to college, I had left the USA, in July 2007, to attend a conference at Johannes Guttenberg University, at Mainz, Germany. I had no intention of returning to the USA in short term, realizing I’d made powerful, corrupt enemies, without adequate resources necessary to pursue closure of the charter school case. However in the meanwhile I’d indicated to persons associated with the school’s administration I had no intention of letting the case go. This produced following result:

On 3 October, 2007, I routinely scouted the geld automat (ATM or automatic teller machine) I typically used at the Johannes Thaler Chaucee mall, in the Berlin suburb of Britz. In the course of my (professional security training) assessment of whether there were any threat, I managed to trigger to action a team waiting in ambush at the ATM location. Because I was on to them before they realized they’d been compromised, I was further able to get a point blank visual identity of Vince Langan of East Mountain High School, one of the triggermen, in circumstance that both, allowed myself to escape and caused Langan to realized he’d been identified. Two weeks later, I had a second close encounter with attempted assassination, with persons unknown, on the number 7 underground.

I immediately (following morning) left Berlin for Lindau (Bodensee.)

Note 7) Tracking myself to an ATM location abroad required access to my banking information, which can be had with a so-called ‘National Security Letter.’ This points to corrupted FBI involvement.

3

Having left Berlin for Lindau in mid-October, I shortly arranged via third party (REDACTED) an invitation for German authorities to monitor my situation (“follow me and watch”) This was a deliberate ploy to trap what I believed (at that time) was attempted murder to silence a whistle-blower (myself) in relation to felonies committed by wealthy, corrupt personalities associated with East Mountain High School.

Two weeks later, when I was walking one early Sunday morning, 4 November, 2007, when few people were out and about, a silenced bullet fired by a rifle at long distance, narrowly missed and punched a hole in a parked car I was walking past.

Subsequently, on a Tuesday, 4 December, 2007, I understood I had picked up the German surveillance I had requested, when traveling to give a presentation to a class at (REDACTED), and German police swept the train I had taken, searching one passenger in my car, and asking for identity cards of everyone and interrogating everyone except myself.

Note 8) The high velocity projectile had hit the parked car I was walking past, with such force, it was clear from the sound, the projectile had punched through the metal of the vehicle body, ricocheted off of a retaining wall the car was in front of, and spun to a stop beneath the car. I returned to the location after some days, assessed the possibilities and it became clear the shot had been fired from long distance, from a natural rise (hillside) with good cover, at a distance of perhaps 500 meters.

4

I had moved to Limburg in the early Spring of 2008 and then to Wiesbaden (June), accepting the invitation of the University at Mainz, to teach a course (in English) on American Constitutional law (Summer semester.) This Summer of 2008 was an intense game of cat and mouse for myself, in relation to my would be assassins/stalkers. Of my several Wiesbaden encounters, the most notable events are:

My Motorola (Razer) cellphone with its’ t-mobile USA chip suddenly quit behaving normally, it no longer showed the ’t-mobile D’ (Germany) reception logo, no longer required international code to access my voice-mail in the USA, and in fact the screen appeared (and phone behaved) as though I actually were in the USA. It had been somehow patched around or through the German reception network and appears to have been used by American intelligence (NSA) to GPS my location in real time. I converted my phone to a German t-mobile pre-paid chip.

About the time I’d noticed this phone modification had happened, a glass pellet had been shot at myself while walking a crowded sidewalk on the North side (my area of residence) in Wiesbaden. I heard what sounded like a powerful spring mechanism release behind me, and turned to look, to see a man keenly observing myself as he walked out of the crowd (brown Stetson style hard felt hat, caring an attache case) and into the street, to cross the street and get away. He kept looking at me as though expecting something to happen. When I had returned to my apartment, sat at my desk and removed my knit hat, a very small glass pellet, appearing to be filled with an opaque liquid, had fallen out of my hat, onto my computer keyboard. This pellet had been captured intact by my knit hat, where it was rolled up at the back of my head. I carefully collected (without touching) the glass pellet into a small prescription medicine bottle with my name on it, and packed it with tissue paper as a safety precaution and sent it to analysis via (REDACTED)

Following this preceding incident, I noticed it appeared as though I were being scouted for purpose of establishing my routine habits (the GPS component apparently having been lost due to my phone conversion.)

One person etched into my memory, although I did not know who she was in the Summer of 2008, was then active CIA officer Sabrina De Sousa. She jumped out on account of her smirking at myself when passing on the street. She was clad partially in the casual clothing of South Asia, and gave me a knowing smile and expression that can only be considered remarkable, when encountered in a total stranger. This marked De Sousa in my memory.

Of the several attempts during this period, one attempt clearly resembled the technique employed in the ‘Imam rapito affair’, also known as the Abu Omar case, in which De Sousa was involved. I was returning from teaching class at Mainz, when I noticed an aberration (due to my training) in what otherwise would seem a normal and unremarkable event. A group of men dressed in the typical blue German workingman clothing, taking a break.

The circumstance jumped out at me as I approached for the following reasons; there was no conversation at all, they looked ‘posed’ (stiff, as if unfamiliar with acting), had American body language and what I would call ‘Delta Force’ physiques (the sort of body build you will typically encounter in hyper-physically trained special operations soldiers.) Other than clothing, they did not resemble German laborers at all. My route on the sidewalk would have taken me between what amounted to a close, half-circle of three of these ‘workers’, and the half-circle closed to the street by the open, sliding side door, to a white, windowless van with at least one occupant.

There was a fourth ‘worker’ sitting in the passenger seat (with door open) of a car pulled up closely behind the van, concealing the van’s identity plate from behind. He appeared to be a ‘backstop’ positioned in case I’d evaded or somehow came through the initial three poised to shove myself into the van. Clearly, it was expected I would walk between the half-circle and the van. I approached as if unconcerned, to get as close as possible for visual assessment and at the last moment, instead of continuing on the sidewalk into what certainly was a ‘snatch’ and ‘rendition’ trap (I could have been popped into the van and subdued in a matter of a few seconds, less than five seconds, certainly), I walked out into street and into possible oncoming traffic (and was lucky not to be run down by a car.) Evasion was simple.

The last attempt at Wiesbaden, was when the apartment I had been renting was to be advertised for new tenants. There was an immediate response from a couple living on the United States military base there. This German couple could not take the apartment over from me too soon, they were anxious to move in as soon as possible. He was from the former GDR, was a huge George Bush fan and worked for the American military in some undisclosed capacity (evasive), and she ran a florist business on base.

She shortly called me and stated she would like to bring some packages to leave at the apartment, the evening before I vacated (on a Friday), which raised an additional red flag. I simply said to call me on the preceding Tuesday and ask then, as I could not yet know if I would be home on the evening she wished to come over with the packages. I knew (and did not say) the landlord wished to make some renovations. I left the week preceding my vacancy date, and by the time she called, the apartment had been thoroughly gone through by the landlord and I been out of Wiesbaden for a week. When she asked if the packages could be brought over on Thursday, I replied “I am in Berlin, you will have to ask the landlord.” Her reaction was to shout “He’s in Berlin!” to her husband (co-conspirator) and then her husband launched into a tirade in German… with the German authorities having an open invitation to monitor all of my phone calls, I expect they discovered two Germans working for American intelligence.

Note 9) Without going into detail, I had set up a test during this period, following shutting down the GPS of my phone, by confiding to a close confidant via Skype, technique I expected might work to take me down and succeed in assassination of myself. This was the next technique tried but I was ready for it, saw the circumstance developing and foiled the attempt.

Note 10) I will mention here, I had nearly one full year on the job training (1974-1975) in military special operations intelligence (19th Special Forces Group) with some of the most experienced of that era, and furthermore, I am highly trained in asymmetrical counter-intelligence, concerning technique I am not at liberty to discuss. However oblique reference may be made to this second instance, with referring the reader to this study: ‘Unconventional Human Intelligence Support’ by Commander L. R. Bremseth, United States Navy, 28 April 2001, Marine Corps War College.

Note 11) REDACTED

Note 12) I lost specific timeline notations from this period and going forward, due to a future failure of my laptop and resultant data loss. After the data loss event, I did not resume the habit of keeping notes on much of my experiences but am able to reconstruct some important events timeline with other records.

Note 13) By late 2008, I had realized this was no simple attempted murder case to cover up a school’s corruption, but was something by far bigger. My resolve was to take it as far as I could, in the hope of my being surveilled by German police to now, particularly, would lead to breaking the larger picture of clandestine effort in attempted assassination of myself, into the light of day. At this point I did not actually expect to survive, but was determined to do as much damage as possible to the criminal element, through exposure via the clandestine arrangement of monitoring of myself.

5

After several weeks stay in Berlin, in December 2008 I relocated to Catalonia, Spain, renting an apartment in the town of San Feliu de Guixols.

My stay in Spain was intense, but I will limit my notations to a few extraordinary events.

The Spanish domestic intelligence communicated with me directly, to let me know they had picked up monitoring my circumstance. How this was communicated (including direct ‘thank you’, among other events, on several occasions) is perhaps best described using this early example: I had a remarkable encounter with a woman in a grocery store adjacent to my apartment. It was like a Woody Allen scene in a movie. Only a few days later, this precise scene was caused to be reenacted with myself by another woman who had accosted me in different store. Clearly, she had studied security video of the earlier encounter and this second encounter closely mimicked the first encounter, to let me know I was monitored.

It was while I was in Spain in 2009, CIA officer Sabrina De Sousa sued the USA for diplomatic immunity over her role in the ‘Imam rapito affair’ or the ‘Abu Omar case’, this broke into the news with her photo in online media (New York Times) and I immediately recognized De Sousa as the smirking woman I’d encountered in Wiesbaden the previous Summer. While monitoring the AP Wire (RSS feed) I also picked up a statement attributed to Italian defendant, General Nicolò Pollari, to the effect ‘Condoleezza Rice had been personally overseeing the renditions team in this case.’ He wished to subpoena Rice in his defense.

This is when the larger picture of my own circumstance first began to make real sense. If Condoleezza Rice had been ‘personally overseeing’ a renditions team that included Sabrina De Sousa, this indicated my case was not only about East Mountain High School but had ties going back to the Badger-Two Medicine case of the Blackfeet Brave Dogs Society, CHEVRON, and the Bush Sr administration. Rice’s career path has been from CHEVRON board director to Bush Jr National Security Adviser to Secretary of State (The United States Department of State is Siamese twin to the CIA) and back to CHEVRON, post Bush era. Coincidental to this, two attorneys preparing legal memos on Native American rights cited by the Forest Service in the Badger-Two Medicine case, John Yoo and Jay Bybee, had since become infamous as renditions related Bush ‘torture lawyers.’

In June of 2009, related to these new developments, I had made a brief trip to Berlin to secure the defunct NGO ‘Association for the Support of the North American Indians’ file on the Blackfeet Brave Dogs, which I knew would include incriminating, related documentation. I personally went through the file to ascertain there was a complete record of documentation on the CHEVRON criminal ring previously encountered in the Bush Sr administration (it was all there) and arranged the entire file to be sent on to (REDACTED), which was done.

Date unknown (data loss) a second silenced bullet narrowly missed, fired from a high rise in S’garo, as I walked from the suburb of S’garo, across the rise into San Feliu de Guixols. This event occurred as I passed a construction site where a stone strewn bank caused the the missed high velocity projectile to ricochet. The pedestrian in front of myself jerked his head in the direction of the bullet striking the stone, it could not be ignored.

24 October 2009, I avoided being deliberately run over by a new, red, rental car, by two dark complected males whose arms were covered in gang tattoos.

20 Feb 2010, I surprised former CIA ‘Cowboy’ Gary Berntsen (now in private contracting) at the Hotel Barcarola reception desk in S’garo, it was between 7 & 8AM, as he was checking his hit team into the hotel. We were caught on security camera together.

Gary’s initially had a stunned blank look, which became an expression as though he’d been busted with his hand in the cookie jar and wished he could crawl under a rock as I stood inches from him, literally rubbing elbows, his bodyguard just stood there staring at me with a stunned, stupid look in circumstance that completely blew their cover, I couldn’t help myself, I had to laugh at them on my way out the door. I gave them about six hours head start before posting the fact of that morning’s encounter online, where Spanish domestic intelligence looked for updates on my encounters. Berntsen & Associates were smart to flee.

On the 5th of July 2010 I spent about half an hour visiting with two very polite regional policemen [Mossos] at my door. What the policemen said, was interesting. The police copied my passport information, questioned me about details that would confirm my identity, reported in with their radio my name, my information and had me sign a statement to the effect I had lived in my present apartment “for more or less one year, to be provided to the judge” who wanted to confirm the identity of the person lived in my apartment. I made no secret of the fact I was unregistered in Spain, and I made it clear I had no intention of registering with immigration or applying for residency. The police assured me my staying in Spain was not a problem and they had no interest in anything other than confirming my identity for the judge.

It was about this time I am fairly certain I had been poisoned. I had one day, after eating out, suddenly suffered a copious sweat without fever and after, my health took a downward spiral. That and the fact Judge Baltasar Garzon had been recently been removed from the bench in Spain under immense pressure from the USA in a corrupt and politicized process (I had followed Judge Garzon’s case closely), together with the Popular Party taking power, I felt made my stay in Spain untenable. I returned to Berlin in August.

Note 14) Summer period of 2009 had since vanished from all my online email records, beginning shortly after I had this published this following letter of 18 February 2009 online, posted on 3 June 2009. Most of June, all of July and August went missing, and much more to early 2010, 4 accounts, 3 google and 1 yahoo. This coupled with my previously having been tracked via my Wells Fargo Debit Card (ATM use) and by T-Mobile USA cell employing GPS .. all point to accessing my various accounts, inclusive of phone, banking, and email accounts, via National Security Letter and law enforcement complicit in tracking me for purpose of attempted assassination in exile. The letter I had made public on 3 June:

18 February 2009
From: Ronald West
To: Federal Bureau of Investigation
Greetings FBI
I am asking a copy of this mail be placed in my file, also that a true and complete copy be forwarded to Glen Fine at the Office of the Inspector General for the United States Department of Justice-
Based on my experiences of the past 3-1/2 or so years, I request the following:

An investigation into/and comprehensive review of any related investigations which granted any agency of the United States, to include your own, access (via National Security Letter or ANY means, e.g. Executive Order or legal memorandum bypassing the ‘FISA’ court, etcetera) to my personal information (particularly to my whereabouts via ATM banking records and (GPS) cell phone, email and conversations on ‘skype’) which may have led to my several experience including but not means limited to:

In Berlin, Germany of being stalked at Johannesthalerchaucee Mall (area of Britz Sud) in very close and tense circumstance by Vince Langan (or what appeared to be his identical twin) of East Mountain High School (Sandia Park, NM) together with accomplice on 3 October 2007-
How that may relate to a few weeks later a silenced bullet narrowly missed me and punched a hole in a vehicle I was walking past at Lindau, Germany-

Under what circumstance further stalkings and what appear to be assassination attempt relating to my t-mobile phone being patched directly through to the t-mobile usa network while I was in the greater Frankfurt region, Limburg and Weisbaden, particularly in late March-early April 2008, bypassing ‘t-mobile-D’, screen showing and phone behaving just as though I were in the USA, and any relationship of that to the preceding-

And related to all of the above, review the activities of (REDACTED) as to whether or not she is or has been an asset of yours or any agency of the USA or has been in a quid pro quo relationship with yours or any agency of the USA or in any capacity or related investigations or actions going to the preceeding paragraphs, cooperated in any investigation or related action concerning me directly or indirectly, with her befriending myself for the purpose at any point in any investigation, of soliciting enough information to implicate but in fact negligently and mistakenly implicate me, short of soliciting enough information to clear me, relating to any actions and/or existing referals of yours or of any USA agency, or any person relating to any such investigations, actions or agencies- impacting my Social Security Benefits in such a way as to effectively use official capacity to bring me into the jurisdiction of the USA or otherwise tamper with my freedom of movement or any other impact on my civil liberties in a ‘R.I.C.O.’ like criminal enterprize, or under any other circumstance related to the preceeding paragraphs, cause undue review of my social security file constituting harassment and hardship in my or my family members lives-

And request the Inspector General for the United States Department of Justice independently inquire of the appropriate authorities in the Federal Republic of Germany as to any known facts of any investigations which may have been or are ongoing relating to any/all of the preceding.
I am BCC copying this communication to two attorneys, one in the USA and one in Germany. These are NOT my attorneys of record. I am copying them because they are discreet men I trust as possessing the highest possible ethical standards and I want a record of this mail in the hands of trusted 3rd parties- which includes any lawful authority, attorney or other person they may, in their discretion, additionally decide it is appropriate to place copies with.

Sincerely
Ronald Thomas West

This letter (above) was not rejected by the FBI mail server, sent to albuquerque@fbi.gov but it was not long after, I began receiving this following response to mails copied to the FBI at Albuquerque (I had, up to then, copied the FBI on my activities)

—– The following addresses had permanent fatal errors —–
<albuquerque@fbi.gov>
(reason: 550 #5.1.0 Address rejected sylvia.maruffi@ic.fbi.gov)

—– Transcript of session follows —–
… while talking to ic.fbi.gov.:
RCPT To:<sylvia.maruffi@ic.fbi.gov>
<<< 550 #5.1.0 Address rejected sylvia.maruffi@ic.fbi.gov
550 5.1.1 <albuquerque@fbi.gov>… User unknown

This (preceding) indicates my mails had been previously routed through to a ‘Sylvia Maruffi’ who appears to have been removed and her address at the Albuquerque office cancelled or changed.

In an unrelated Albuquerque Federal Court pleading that had been posted online by a litigant in May of 2009, I found the following statement:

“.. the situation being reviewed by Sylvia MARUFFI an FBI Investigative Analyst”

This clearly points to FBI Agent Sylvia Maruffi assigned to investigating myself up to the time of the letter sent to the FBI Albuquerque office on 18 February 2009 and Maruffi clearly being a ‘person of interest’ in relation to persistent attempted murders (of myself.) Incidental to this, the FBI has never acknowledged my (emailed) letter of 18 February 2009, although they were clearly in receipt of this communication.

6

I lived in Berlin from September 2010 through July of 2012. Of several incidents over this period, this one stands out:

While living in Charlottenberg (Berlin) during July 2011, I had my 1st experience with intelligence agencies using proselytizing evangelicals as cover for an assassin team. I’ve puzzled a bit over whether “Jews for Jesus” were a MOSSAD or joint MOSSAD/CIA venture but by now I’ve settled on MOSSAD. It was a Wayne Madsen article had pointed out the CIA had used missionaries in the past, in Latin America particularly, but Jews for Jesus are an altogether different animal. In Berlin, no one is going to poke their nose into the business of any Jew, it is a perfect (the MOSSAD must think) cover. This appeared to be another case of ‘quid pro quo’ (previous ‘quid pro quo’ by MOSSAD in the attempt made on the U7 line in Berlin, 14 October, 2007) or one nation’s agency intelligence acting on behalf of another nation’s intelligence agency, this is not at all unusual.

It is a double blind deniability built into operations, evangelical Christians posing as Jews. Four out of five or perhaps nine out of ten of these so-called “Jews for Jesus” are deceived and unsuspecting evangelicals simply trying to convince people to be ‘saved.’ They are flown in from around the world in shifts volunteering time as missionaries and are conveniently on hand to locate to any area where a hit operation is meant to take place.

The target is supposed to get used to seeing them in his/her area and this is supposed to produce a complacency surrounding the missionaries while your habits are studied, which U-Bahn (underground) you take and most regular times. By the time any target is used to and ignoring “Jews for Jesus”, with routines established, the unsuspecting proselytizing members are replaced with kill teams from MOSSAD wearing ‘Jews for Jesus” shirts and the target (the theory must go) will not notice he/she has been marked going into the subway where a most ‘unchristian’ poison needle is a heart-attack inducing prick in the crowd that cannot be easily picked out of security video and so it is one more joins the people who drop dead of natural causes everyday, it’s that simple. Except when it is not that simple, as when the target is onto what is going on, because the intelligence agency is stupid.

When Americans flown in from the Midwest Bible Belt have been replaced by Israelis whose general demeanor, facial expression and body language is top to bottom different from the duped evangelicals (who should not, after-all, be surprised that actual Jews would be involved with their organization), it is not going to be missed by someone with my level of training. It was in Charlottenberg, I noticed it a couple of Israelis studying my habits, while it was Americans covered the larger public area I frequented, for a few days, and then it was Israelis had staked out my U-Bahn entry. I entered, but instead of going down a 2nd level and taking the train, I walked out another entrance, as though I was using the U-Bahn station as a method to cross an intersection without having to deal with above ground traffic lights and ‘walk’ signals, while watching for any tail I might pick up and sure enough… a tall Israeli in civilian clothes (no ‘Jews for Jesus’ shirt) reversed direction and emerged behind me but I was ready for this, and had positioned myself with back to wall at an outdoor café table, sandwiched between people also facing him with backs to wall and he could not hit me with his needle without giving himself away. Totally the wrong crowded scene, it was my advantage, not his. He stupidly studied my circumstance for a minute, hesitating, starting to leave, stopping to study again, wondering what to do while obviously completely out of sorts, gave up and left as I’d been looking steadily and directly at him and him at myself.

In August 2012, I moved to a small village in in the south of Germany.

Note 15) It was August, 2011, (REDACTED), who’d mostly gone out of contact with myself after I’d hand delivered the glass pellet captured by my hat in Wiesbaden, to be delivered for analysis, and followed on with delivering the incriminating Badger-Two Medicine file to him, came into contact just long enough to make excuse to terminate our close association (he accused me of writing “Hate” in reference to my satire compositions) of nearly twenty years. My impression is (REDACTED) had lost his nerve.

7

In November 2012, I visited Berlin and had a close encounter with a would be assassin on the U7 underground (3rd U7 attempt over 5 years), and this incident was the proverbial straw that broke the camel’s back.

By now, with 5+ years of German domestic authorities aware of and/or following my odyssey, with no action taken to pursue justice, no arrests, and no prosecutions, I came to realize there likely would be no action whatsoever taken, so long as a USA sycophant, conservative government ruled in Germany. After some period of reflection, I resolved to push back at the German government. I devised a legal strategy to bring a heat against Germany in the International Criminal Court for aiding and abetting the USA in crimes that the USA could not be prosecuted directly for, as the USA does not belong to the Rome Statute creating the court. I also resolved to push information on Christian extremism at the Pentagon, material I’d gained in informal cooperation with the Military Religious Freedom Foundation (since June, 2008), on German parliamentarians, together with the copious anti-Semitic hate mail directed against the foundation, provided to myself by Mikey Weinstein, MRFF president. These efforts began from my hideout in Southern Germany, in 2013.

Note 16) According to a Washington Post investigative report in 2011, “some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States. An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.”

This is bolstered by a bloomberg.com article: “Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency”

Additionally, the US Congressional watchdog GAO [Government Accounting Office] reports as a result of faulty data, US intelligence agencies: “are not well-positioned to assess the potential effects of relying on contractor personnel”

And then, a US Army Intelligence Officer stated to Buzzfeed: “I think if we had the chance, we would end it very quickly.” [USA intelligence would like to find Snowden] “Just casually walking on the streets of Moscow, coming back from buying his groceries. Going back to his flat and he is casually poked by a passerby. He thinks nothing of it at the time starts to feel a little woozy and thinks it’s a parasite from the local water. He goes home very innocently and next thing you know he dies in the shower.”

In fact most of the unlisted events (in this chronology) experienced by myself had to do with evading stalkers whose behaviors profiled for action as described in the paragraph preceding.

This points to the utter corruption of American intelligence, where a corrupt Pentagon, that has thrown the rule of law under the bus, and associated corrupt corporate personalities (e.g. Christian extremists Condoleezza Rice and former NATO Supreme Commander & Obama National Security Adviser General James Jones, in association with CHEVRON) can access top secret material via the Pentagon’s NSA (National Security Agency) for essentially any purpose they please, up to and inclusive of assassination.

8

2013 was mostly uneventful, relating to attempts on my life, working from my South German safe house. I managed to file the complaint with the International Criminal Court against Germany (presently on hold while the court waits for me to provide further information), and initiated a campaign to educate the German parliamentarians on the Pentagon led Christian extremism infecting NATO. In September 2013, I relocated to Leipzig. In December 2013, I left Germany to live with my girlfriend in (REDACTED.) We registered as living together and three weeks after, I was presented with an Ministry of Interior order expelling myself from the country. The order is in force throughout the European Union and consequently I am under daily threat of deportation to the USA. It is utterly immoral to force myself to seek political asylum in this circumstance but in fact that is precisely what may be required, in this ongoing travesty of justice where institutions of law have refused to move against the criminals I have exposed to the authorities.

9

The result of what I have named ‘alpha’ investigation is clear.

Corporate organized crime in the military-industrial complex fused with institutions in NATO and rogue elements in intelligence agencies (with the beyond Orwellian twist of ‘Christian Dominionism’ thrown in), together form an international ‘deep state’ dedicated to the subversion and eventual overthrow and/or control of western democratic institutions. The German government and law enforcement is now fully aware of ‘alpha’ elements that have operated exterior to the parameters of law in Germany. Incidental to this, alpha’s operational command and control centered in the USA has had the German political establishment intimidated at the highest levels.

With the German government well aware of all the necessary facts concerning ‘alpha’, from police at the local level to the top politicians in Germany, there is really little more to accomplish. The ‘alpha’ investigative result cannot stay swept under the rug indefinitely, too many people now know what is happening, and ultimately, I have little control over when it breaks into the open or how it will develop subsequently. This will have to do with any remaining institutions concerning the rule of law which have not yet been co-opted by the criminal enterprise behind ‘alpha.’ It is the undeniable responsibility of these institutions to take the information developed surrounding ‘alpha’ forward; towards restoration of an authentic constitutional order.

Note 17) In Germany, where there is no hesitation to arrest and prosecute Islamic terror cells bent on conspiracy to murder, four successive German Interior ministers have failed to act against the same behaviors when conducted by, or on behalf of, Christian extremists in American intelligence and associated corrupt personalities pursuing crimes on German soil. Those German Interior ministers, in order of tenure, are:

Wolfgang Schäuble, 22 November 2005 to 28 October 2009

Thomas de Maizière, 28 October 2009 to 3 March 2011

Hans-Peter Friedrich, 3 March 2011 to 17 December 2013

Thomas de Maizière, 17 December 2013 to present (2nd term)

-Ronald Thomas West, February 2014

Jeremy_Bentham

It were one Jeremy
Put a scare in thee
Stuffed wit straw
But for his maw
Menacing his posterity

Call him ‘The Headless Horseman’ of philosophers. Bentham arranged to have his skeleton padded with straw and stitched into his clothing .. where he’s since dwelled in a closet (for the past 183 years.) This is quite apropos as he was altogether unsuccessful when he’d sought to decriminalize homosexuality. Because his mummified head is too grotesque to gaze upon, it is kept locked away and does not attend those College of London council meetings where Bentham’s wax substitute for his dehydrated brains is perched on his bones and listed at roll call as ‘present but not voting.’

Like so many champions of modern democracy, for instance Barack Obama and David Cameron, Bentham espoused individual freedoms while in actual fact he’d been busy designing the precursor to our present day surveillance state:

The Panopticon is a type of institutional building designed by the English philosopher and social theorist Jeremy Bentham in the late 18th century. The concept of the design is to allow a single watchman to observe (-opticon) all (pan-) inmates of an institution without the inmates being able to tell whether or not they are being watched. Although it is physically impossible for the single watchman to observe all cells at once, the fact that the inmates cannot know when they are being watched means that all inmates must act as though they are watched at all times, effectively controlling their own behaviour constantly. The name is also a reference to Panoptes from Greek mythology; he was a giant with a hundred eyes and thus was known to be a very effective watchman

Jeremy Bentham had been the prime candidate for patron saint of the National Security Agency, that is until a debate arose; whether he’d been the inspiration for a shepherd’s sexual encounter with a body of straw stitched into a man’s clothing:

Scarecrow_sex

*

Perverts of Western Philosophy

The Satires

Updated 17 August 2014

Joseph Lorenzo Hall, chief technologist for the Center for Democracy and Technology states the idea of becoming “NSA-proof” is “just silly. If they want it, they can get it”

“And so he takes great pains to stay one step ahead of his presumed pursuers—he switches computers and email accounts constantly. Nevertheless, he knows he’s liable to be compromised eventually: “I’m going to slip up and they’re going to hack me. It’s going to happen”” James Bamford, quoting Edward Snowden

All the encryption in the world isn’t going to protect a hacked computer, trust Edward Snowden. But first, a bit of my own story and then on to how (not) to leak:

When I’d exited the U.S. Army in April, 1976, I held a top secret clearance. The only documents I had taken with me were a complete record of my military 201 file. I also had (since) acquired copies of my veterans and social security files. How I’d managed copies of these are a secret, along the lines of Benjamin Franklin’s ‘three people can keep a secret if two of them are dead.’ In this regard, it is worth mentioning I have held information between my ears that has never been entered into a computer, let alone sent via any email.

Ok, so I can tell how I acquired the social security file, the social security administration fucked up and mailed me my own file. Yes, the original, which I went through with what certain people might have assumed would be great satisfaction, as supposedly I realized I was the censor who’d decide what I could see in my file. Of course I redacted or with-held nothing in my self exam, prior to sending the file on to my attorney who notified the social security administration we were (supposedly) inadvertently in possession of the file and to who should we send it to? A lady at the administration, in subsequent conversation, commented to myself something along the lines of ‘NO ONE has had the access to their file that you have had…’

But in fact this social security business was patent bs. Almost certainly the file had been deliberately sent my way, stripped of certain records, to throw me off the trail of then senators Max Baucus and Conrad Burns who both were suspects in regards to my file having been sequestered for months at the Social Security offices in Maryland while it was investigated whether I could be charged with fraud. Why? The USA appears to have left no stone unturned in efforts to take myself out of the public circulation due to my anti-corruption work of that era (1990s.) It was about this time I’d produced copies of records from my VA file (like a magician) after certain originals had gone missing following an ‘expert’ sent from Washington to Helena (Montana, where my file was kept) to ‘review’ files, kept me from charges of fraud relating to my veteran’s disability pension.

This (failed) ‘deep state’ caper in regards to attempt at trumping up felony charges intended to send me to jail and end my work, follows typical false flag spy-craft model. The people hearing the case, had it been successfully pursued, would have been innocents looking at a record they could not know (or believe) had been tampered with, to secure a conviction. My having copies of my VA file documents, saved my butt. I produced the necessary copy of a critical document at the initial hearing and the case was dismissed on the spot.

It wasn’t until I’d dug into the USA’s funding of charter schools as cover for intelligence embeds, the agencies had begun playing hardball or, that is to say, devoted resources to taking me out physically (assassination.)

Prior to this, during my stint with Special Forces, I’d the best possible education in operations and intelligence because it was not school, but OJT (on-the-job-training) with veterans of operations coordinated with CIA in Indochina and Central America. This was the best (or worst, depending on one’s perspective) avenue to knowledge in the ‘game’ of international intrigue; it was unrestricted, first hand knowledge of the dirty aspect of the business on the ground, where the intrigues hatched by criminal minds at Langley, Virginia, are played out.  Suffice it to say, I departed Special Forces with a remarkable understanding of how underhanded the game of spies is played, the paramount importance of employing psychology to one’s advantage (in often devious ways), and the imperative necessity of the death of one’s conscience to be successful and survive (and ultimately is why I accepted a reduction in rank to leave a Special Forces intelligence assignment and retrain for a new & different skill set, shy of a year on the job.) I took my conscience, intact, with me on departure, together with a remarkable skills set I developed through experience, in subsequent work as investigator. My favorite of these skills had been open source analysis, in fact in light of the avalanche of criticisms since the Snowden revelations, it has been pointed out CIA open source analysis has been more effective, by far, than any NSA program, in relation to spy-craft.

Now, applying old school spy-craft, to the point of this essay; how NOT to leak-

Since WikiLeaks, we’ve had ‘OpenLeaks‘ (a flop) and now we are presented with ‘SecureDrop.

However ‘SecureDrop’ might be well intended, I wouldn’t touch it with the proverbial ten-foot pole. What’s more is, I doubt you’d even need it, if you wished to leak. I’ll go into the why you wouldn’t need it first, and then why I wouldn’t touch it.

If you wished to have a secure platform to leak criminal activities from, as opposed to a ‘secure’ online platform to leak to, you should be able to build one yourself. And you shouldn’t need to be a computer guru to do it. The recipe is exceedingly simple:

Acquire an older laptop that cannot be traced to you, from a yard sale in an unfamiliar neighborhood, example given. Park your car away from where you make the purchase. Or pick one up in a junk store. I don’t advise stealing a machine, but that’d work if you’re a professional thief and don’t leave a trail. You prefer a laptop that predates NSA advances in modifying computers in the commercial market. Acquired a working clunker from 2002, say a PowerBook with an airport card? Perfect. An Apple machine is preferable, so there are no complications with anti-virus updates. We know the NSA has arranged to implant computers with bugged software, actual hardware in some cases, and we want a computer that does not ‘call home’ (NSA) when certain red flags might be triggered by materials you might be handling.

Now, before you even fire the old machine up for the first time, you kill the web-cam with indelible marker or a piece of paper taped over it will do just fine. And you plug the microphone and speaker jacks with dummies cut from discarded actual microphones and speakers and epoxy them in place, just to make certain they stay there. Cut them off where the metal plug extends from the jack, so they are not obvious. Now your ‘leak platform’ is blind, deaf and dumb. Search the machine for any GPS integrated software programs and disable them. DO NOT log into internet from your home.

Now, as to what you might be leaking, consider whether it will be tracked to you on the back-end (source.) Be assured there will be (post Snowden) efforts to do certain things, like identify a computer that had items downloaded onto a memory stick. How will you get your materials safely to the machine you intend to leak from? Old fashioned spy-craft is something to consider, if you do not feel secure in the environment whose security you are breaching. Digital photos of actual documents can be loaded into the computer or paper documents can be scanned into your ‘leak platform’ (in which case you will want an older, untraceable scanner as well.) Use a digital camera that cannot be traced to you. You NEVER want to mail by post any documents, because certain addresses will be flagged by intelligence agencies and your package could be intercepted and might give up fingerprints and/or DNA. and other information, such as a the postmark information needed to review security footage at specific location on certain date. Also, you’ll want clean paper documents for a scanner (particularly) or digital camera, on account of the possibility with a high resolution, you might inadvertently scan your own or your colleagues fingerprints (use gloves when working with any paper documents.)

Ask yourself, is the material you are considering making public, of a demonstrable criminal nature? Or, does it shock the conscience in a sense of egregious violating principles of ethics? COVER YOUR ASS, BECAUSE NO MATTER THE PRECAUTIONS TAKEN, YOU MIGHT GET CAUGHT. Public opinion might save your butt, but don’t count on it, it hasn’t worked for Snowden (yet.)

Remind yourself, from the time of Bradley Manning to Snowden, there has been a dearth of leakers that have gone undetected. Has it ever crossed your mind there has been no ‘deep throat‘ in our present era, and why it seems everyone gets busted instead? As well, our Federalist Society majority on the USA’s ‘deep state’ owned (corporate board controlled) Supreme Court has just refused first amendment free press protection to journalism in the case of James Risen in a leaks case. They’ll be after you with everything at the system’s disposal and your chances are not good if you are detected.

Now, you’ve decided, as a patriot, your leak is worth your liberty and/or life and you’ve convinced yourself you’ve stolen the material you wish  to leak without getting caught (let’s hope you’re right) and it’s time to deliver to the journalists, undetected. Perhaps you’d wish to wait three or six months, after you’ve gotten away with the initial theft, it’d be nice if the trail grows cold. Now, your documents are loaded into file that is easy to access, for instance located on the desktop. The email addresses you wish to send the information to are handy. Now, your platform, ‘Dr Leakey’ (named for the archaeologist), is ready. You are in familiar turf (if you are confident), or you have traveled to unfamiliar territory (if you have nerves of steel.) What you need is an open wireless signal you can log onto. When you’ve found this at a cafe or a truckstop or simply a careless person in any neighborhood where you can log in from, sitting in your car parked close by, log on. Create a faked email account (that you will never use again.) Send a first mail (BCC to recipients) to yourself, explaining there is a second mail following with attachments and stating if the recipient does not see the second mail, to look in their spam folder. This mail should pop up and you see it with no failed addresses (from the BCC to the people you are mailing.) Seeing you have a working address on both ends (i.e. a functioning mail account) and are you still determined to do this, ask yourself, for real? Deep breath, new mail addressed, attached file(s), hit send, have coffee, read the paper, look at ease, normal, belonging in your environment while the what might seem like ages in time pass as the file uploads over a clunker computer and finally the mail goes ‘whoosh’ (in your mind) and the leak is done.

Calmly go on about your day and know how you will be disposing of Dr Leakey. You used him for this one project and will never use him again. Example given, pull out the ram, hard drive goes to the incinerator (an all night campfire will do), break the screen as though Dr Leakey had been accidentally dropped & parts salvaged, and the carcass destination ends in a dumpster. Same end for either the digital camera or scanner, if you used these. Be patient for results in the news. You’ve just dropped a bomb from the unseen world and any journalist worth your while, will take time to try and authenticate the information you’ve provided. If they blow it off and never pursue the lead, maybe the gods actually love you. You’ve laid in a small dose of Valium for a possible polygraph (you can beat by simply being relaxed with telling a lie.) If you’ve gotten away with it, resist temptation to ever do it again. There might be such thing as a charmed life, but it’s probably not yours.

By now, the NSA with its billions of mails to look through, will come up with (at most) someone sent a mail from an account used ONCE, from an old computer they never see log in again, over some unsecured random wireless signal in the greater Los Angeles metropolitan area, example given. Maybe you live in this area of 13 million people or maybe you don’t. This is because you left little in the way of digital fingerprints by finding a way around taking your leak out on a memory stick. Enjoy a quiet laugh and hope you were good enough getting the material out the back-end, with a cold or faint trail, because if you did it right,  they can’t track you from that end. And then erase your personal memory, the one between your ears, because you never wish to tell ANYONE, who you are, in relation to what you’ve done. And at the end of the day, remember Snowden did not use an online leaks platform. He’s since stated he has professional spy training and this is borne out by his actions, he leaked the old fashioned way, along the lines set out by a former FBI agent in the article ‘Spy Craft for Hacks.‘ You’d need cold nerves, excellent understanding of the environment and good luck, to pull it off. Nothing suffices for this like training and even then, there is no absolute way of doing these things undetected. Luck and competence of your adversaries play into this as well.

Now, to why you probably don’t actually want or need to leak. Firstly, Snowden has done everything that needs done. What we know is no longer a conspiracy ‘theory’ (rather fact) is, the USA’s security state is behaving like nazis in relation to surveillance of its own people. We know it’s likely the corporate ‘deep state’ co-opted congress, president and courts are doing and will do little or nothing to actually change this behavior of the MILITARY elements in control of the runaway NSA, other than at most, wring their hands for public consumption. You don’t need much more knowledge than Snowden has provided, to effect change, if change is going to happen. And if change isn’t happening, what’s the point? If our society’s leading lights are merely content (at most) to shout and stamp their feet like spoiled children at what is going on, rather than shut down ‘business as usual’ along the lines of refusing this criminal hydra legitimacy and attending power, and you don’t see the tectonic plate shift in public outrage necessary to force the issue, there really is no point, people have been cowed into obedience along the lines predicted by both Orwell & Huxley. On the one hand you have Orwell’s conservative sheep bleating on behalf of the ‘security’ state over the terror propaganda all of our western world has been fed. On the other hand you have Huxley’s ‘it’s all about me’ MTV generation could care less about civil liberties beyond freedom to consume, extreme sport, sex, fashion and media ego. With corporate media feeding a public with an education one mile wide and one quarter inch deep, Billy Graham and Hollywood (our two primary oracles of ‘god’) rule a society which has cannot be saved from itself, because you cannot get the majority’s attention long enough to explain a few things that might change their focus, if not their beliefs, whether puritan or hedonistic. This reflects social engineering via information operations. Stepping into/out of this world in relation to spies and leaking is a very dangerous proposition for the untrained. Now is time to work with what Snowden has revealed, not obsess with pursing endless soap operas concerning information on criminals you exercise no real control over. And there is a reason intelligence will want you obsessing (keep reading.)

Secondly, what Snowden has revealed merely confirms what can be clearly inferred from open source analysis, our civil structures have become criminal, out of control, one could go so far as to simply state ‘insane.’ And this is what is distracted from, when obsessed with being outraged at the western democracies ‘voyeurism’ in relation to ‘the people’ who supposedly are in control of our future direction via the principle of ‘consent of the governed.’ The propagandists at the several corporate board controlled intelligence agencies, via co-opted western media, will work to guide and exploit this national tantrum to a calmed down child at the end of the day.

As to the ongoing criminal agendas, one only need look at Monsanto as a corporate poster child and how they’ve managed to buy congress and the courts via Federalist Society owned justices at the top, along the lines of ‘citizens united.’ As for the out of control, one only need look at how ineffective congressional oversight has been, and is presently, in regards to NSA, example given, and there is no change in sight. As for the insane, one only need look at the USA, and it’s lapdog western democracies, pushing Russia to the brink with geo-political capers recently best illustrated in Ukraine, and how western media lies to the public about what is actually going on. Left unchecked, this insanity will certainly lead to VERY BAD subsequent events.

Now, thirdly, to alternative media and the so-called ‘progressive’ movement, recalling Snowden leaked the ‘old fashioned’ way and farther reason why I wouldn’t touch any online platform, despite the indomitable Guardian has subscribed to ‘SecureDrop.’

To begin with, directing leaks to electronics communications platforms is playing to the NSA’s strong point, this area of expertise is SIGINT (signals intelligence) forte. No matter the encryption expertise involved in any platform’s construction, it is an invitation to play in the lion’s den. Be assured, the NSA (not to mention GCHQ and other intelligence agencies) will assign crack teams to SecureDrop. To the Guardian’s credit, they warn there is no promise of a foolproof system and they cannot assure anyone 100% security with the new platform. But, in addition to this caveat, there is an altogether overlooked danger in using SecureDrop.

The Guardian is an organization that would be very deliberately targeted by HUMINT (human intelligence) as a matter of fact. Organizations wishing to penetrate, spy, shape dialogue & policy within the Guardian would include MOSSAD, CIA, DGSE (France) and the British intelligence agencies. Each of these agencies will have a vested interest in covert penetration of the Guardian on account of that paper not having been entirely co-opted by the western democracies ‘deep state.’ As opposed to dealing with a Glenn Greenwald who’s connected at the top tier of Guardian management, anything, even were it successfully sent through what might be a presently secure system, is at risk nevertheless, of exposure to clandestine a rabbit warren designed by spies within the Guardian organization. Trust me, they’re there. MOSSAD particularly, would be interested in any information it could potentially acquire, as ‘chits’ to trade to the USA (and other nations) for political favors, as its political currency continues in steady decline over West Bank issues. Just because you possibly managed a ‘secure’ leak over the SecureDrop system, does not mean you are secure, not by a long shot, because you cannot know how the material might be compromised after it has been put through, let alone whether the system itself is already penetrated/designed to identify the source point of the upload. And every week that passes since the SecureDrop introduction, the mathematical probabilities it will be penetrated by national & corporate SIGINT agencies increase, with multiple resources devoted to precisely that task.

And now to the odious (closing) aspect of this essay.

“You can imagine my surprise when I read the June 13, 1971, issue of the Sunday New York Times and saw there among the “Pentagon Papers” a number of basic information papers that had been in my own files in the Joint Chiefs of Staff area of the Pentagon. Most of the papers of that period had been source documents from which I had prepared dozens — even hundreds — of briefings, for all kinds of projects, to be given to top Pentagon officers. Not only had many of those papers been in my files, but I had either written many of them myself or had written certain of the source documents used by the men who did.

“Many people have been so concerned about what has been happening to our Government that they have dedicated themselves to investigating and exposing its evils. Unfortunately, a number of these writers have been dupes of those cleverer than they or with sinister reasons for concealing knowledge. They have written what they thought was the truth, only to find out (if they ever did find out) that they had been fed a lot of contrived cover stories and just plain hogwash

“In the hands of Allen Dulles, “secrecy” was simply a chameleon device to be used as he saw fit and to be applied to lesser men according to his schemes. It is quite fantastic to find people like Daniel Ellsberg being charged with leaking official secrets simply because the label on the piece of paper said “TOP SECRET,” when the substance of many of the words written on those same papers was patently untrue and no more than a cover story. Except for the fact that they were official “lies”, these papers had no basis in fact, and therefore no basis to be graded TOP SECRET or any other degree of classification

“Any reader of the “Pentagon Papers” should be warned that although they were commissioned on June 17, 1967, by the Secretary of Defense as “the history of United States involvement in Vietnam from World War II [Sept 2, 1945] to the present” [1968], they are unreliable, inaccurate and marred by serious omissions. They are a contrived history, at best, even though they were written by a selected Task Force under Pentagon leadership” -Pentagon liaison to the CIA, L. Fletcher Prouty

Daniel Ellsberg has been a champion of WikiLeaks. And now he is promoting SecureDrop for Exposefacts.org. Open source analysis profiles (STRONGLY) Daniel Ellsberg as an intelligence agency officer, almost certainly CIA. What the CIA edits at wikipedia doesn’t inform of, when the public is fed

“Ellsberg served in the Pentagon from August 1964 under Secretary of Defense Robert McNamara (and, in fact, was on duty on the evening of the Gulf of Tonkin incident, reporting the incident to McNamara). He then served for two years in Vietnam working for General Edward Lansdale as a civilian in the State Department”

…is Ellsberg’s work for Edward Lansdale at Department of State has CIA information operations written all over it. One of CIA’s big tasks is information operations or social engineering via psychological manipulation of entire populations. And Ellsberg was working with one of the CIA’s true big shots in this area of intelligence expertise. The ultimate purpose of the ‘Pentagon Papers’ leak was information operations (social engineering) to shield the CIA from public accountability for the massive intelligence & related policy failures in Vietnam; by shifting public focus onto the Pentagon. The CIA was expendable and could have been disbanded. The Pentagon could not be done away with.

Colonel Prouty blew the whistle on the CIA & Ellsberg over 40 years ago. His work, which has borne the test of time, is buried, meanwhile, whistle-blower ‘legend’ Ellsberg invites leakers into the SecureDrop cobra’s lair… as you actually believe the initial SecureDrop developer, Aaron Schwartz, hanged himself. Probably, like Gary Webb shot himself in the head TWICE (Superman could do that.) It’s an old model, for instance when Eli Black had stepped into longtime CIA turf at United Fruit, he was framed with an SEC investigation and subsequently ‘depressed’, Eli  ‘jumped’ 44 floors from his office building. No-no, the CIA liaised generals at NSA won’t be allowing certain activities to move forward unimpeded. The only question with ‘SecureDrop’ is, how it has been/will be compromised.

Has it ever occurred to anyone, as to why, no one has ever outed a ‘Kim Philby‘ embedded in the progressive and peace movements, as though intelligence operatives would never caper within that playground? I’ll name you three. 1) Daniel Ellsberg. 2) Robert Parry. 3) Ray McGovern.

 *

Deep State I Foundation article

Deep State II FBI complicity

Deep State III CIA narcotics trafficking

Deep State IV NATO & Gladio

Deep State V Economics & counter-insurgency

The Alpha Chronology my narrative as Deep State survivor

Deep State Related :

Above Top Secret How (not) To Leak

Poison Fruit Robert Parry’s journalism

Intelligence Agencies & Wikipedia You are what you think

Obama’s Ukraine History of the new regime’s neo-fascism

The New Great Game A motive in Ukraine

Victoria Nuland’s Wedding Allied with Christian al-Qaida

Germany’s Martyrs of the Maidan Nazi collaboration

Dominionism’s Fingers in Kiev The Vatican-USA partnership

The Washington Post & Double Think Geo-political insanity

The Disinformation Nation Propaganda on Ukraine

Tactical Nuclear Weapons for Dummies Pentagon fantasies

Overview Egypt, Libya & Syria

Egypt Round Two The Generals take it back

Syria Part One Al Jazeera (Stooge TV)

Syria Part Two Chemical Madness

Syria Part Three  Obama-McCain-al Qaida alliance

Syria Part Four Syria, al Qaida & Iraq

*

S1

Ronald Thomas West is a former U.S. intelligence professional

The proposal in this essay “In fact it is perfectly possible by the time Snowden had traveled to Moscow with Harrison, he may no longer have been in possession of the documents at all” in fact had been almost immediately established as the case in fact, when Snowden stated he was no longer in possession of any NSA documents when he’d traveled to Russia, in his Moscow interview with NBC

It is a near impossible task to try and wipe egg off someone’s face, that is, if that someone doesn’t care to acknowledge the facts, if the facts shake their foundation in reality or they are simply willfully stubborn. When egg yolk has dried on ceramic, those of you who know how to wash dishes will know to use fingernails, or risk scratches and look for the steel wool. So this analysis is going to be abrasive to the idealists in the peace movement and associated journalists concerned with social justice. And it is an attempt to pull Glenn Greenwald’s chestnuts out of the fire, before they are reduced to ashes by counter-espionage and damage control spooks. Good luck with that, is the cynical admonition to myself, because this one might get eggs thrown at me with a vengeance.

Our present story begins precisely 11 months ago, 23 June 2013, when The Guardian had reported concerning the WikiLeaks supposed (reported widely in ‘mainstream’ media) ‘legal expert’ accompanying Edward Snowden, Sarah Harrison, on Snowden’s odyssey to Moscow:

“Despite her closeness to Assange, Harrison may seem a strange choice to accompany Snowden, as unlike several people close to WikiLeaks – most notably human rights lawyer Jennifer Robinson – Harrison has no legal qualifications or background”

Yeah, that’s likely why Snowden faxed perfectly useless asylum requests all over the world from the Moscow airport, not realizing (technically speaking, such as in an embassy) he had to be standing on the territory of the nation he would wish to acquire asylum in. But it gets by far more interesting. As I’d pointed out in my piece ‘WikiLeaks & Spy Agencies‘…

“In espionage [or counter-espionage], there are three basic means of penetrating and/or using a hostile organization to one’s advantage:

1)  Turning an employee through some means such as blackmail, sex, bribery or appeal to a psychological weakness such as working on someone’s conscience or ideology and convince them to become your organization’s asset (agent/traitor)

2)  Placing your own officer within the organization as an employee (spy)

3) Using psychology and disinformation to convince the organization’s staff to work to your advantage and/or commit acts against its own interests (false flag/sale)

Typically there would be each of these approaches assessed individually and in various combinations and/or variants when planning an operation. WikiLeaks would be vulnerable to this on several counts”

…now, we will look at this a bit more closely in a related development of the past several days.

On 19 May, 2014, the new venture of Greenwald (among others) ‘The Intercept’ published a piece based on the Snowden NSA documents, concerning MYSTIC sub-project SOMALGET, detailing how entire nations are being prepared for TOTAL surveillance of phone traffic, inclusive of all audio conversation. The apparent ‘pilot program’ of laboratory test animals is the Bahamas and an unnamed nation (in the intercept article.)

mystic_somalget_final

^NSA illustration via The Intercept

Almost immediately, Julian Assange (@WikiLeaks) and Greenwald were in a ‘twitter’ spat over Greenwald with-holding the 2nd nations name, Assange claiming Greenwald’s rationale for following long established journalism protocol to protect at risk persons by with-holding information was essentially selling out. AND THEN, WikiLeaks (Assange) threatened to reveal the nation’s name, if The Intercept and Greenwald refused to do so .. and subsequently named Afghanistan. What we see here, on its face, is brilliant counter-espionage work, of a nature so serious a threat to Greenwald (and others) journalism at The Intercept, as to appear to send Greenwald to Moscow to meet with Snowden, or so rumor would have it:

^Destination Moscow (in closing remarks by hostess)

The problem with WikiLeaks naming the unnamed country? Now, the ‘mainstream’ (CIA manipulated) media can claim in full on attack on Greenwald and the others at The Intercept, these journalists have no credibility insofar as security of content concerning the NSA documents in their possession. As well, there most certainly will be assessment of possibility to link Greenwald (and others at The Intercept) to any criminal case being developed against Assange. Touche, NSA! Counter-espionage has drawn blood.

Now to the question .. how did WikiLeaks acquire the name of Afghanistan? WikiLeaks isn’t saying. But first suspicion would naturally fall on close Assange confidant Sarah Harrison who’d been with Snowden ’24/7′ for weeks while Snowden was sorting out where he might be able to safely stay (having to ultimately settle on Russia.) I believe this is the least likely scenario, however we will go there first. It’s as simple as Sarah Harrison would have stole the documents from Snowden. If that were the case, WikiLeaks has all of the Snowden NSA disclosures and they don’t dare admit they’d violated Snowden’s trust. If Greenwald is indeed in Moscow meeting with Snowden, it would go to exploring this possibility. But I doubt this is what happened, not because WikiLeaks would not have stolen the documents if they could have, but because I expect Snowden was smart enough to secure the documents throughout Sarah Harrison’s stay with him, not every possible ‘honey-pot’ or using a woman in seduction for operational purposes is going to be successful. Whether Harrison were Assange’s mole or a British intelligence agent or double agent, Snowden was not a good candidate to fall for this sort of operation when it is demonstrable Snowden’s own girlfriend had no idea what he was  up to in the months and days leading up to his revelations and flight. The man is well disciplined in the rules of personal secrecy attending espionage. In fact it is perfectly possible by the time Snowden had traveled to Moscow with Harrison, he may no longer have been in possession of the documents at all. But the brilliant aspect of this, from the point of view of counter-espionage and exploiting public perception is, it will appear the documents were not secured and Greenwald & Laura Poitras can be pilloried as irresponsible and endangering the USA’s national security, inclusive of putting lives at risk, possibly to a point of building a criminal case. Meanwhile, if Greenwald had traveled to Moscow, he is barking up the wrong tree.

The more likely scenario is quite straightforward. The NSA arranged to ‘leak’ the information concerned to WikiLeaks, for clear intent of going after Greenwald and The Intercept with PsyOps, sowing distrust and misleading the principal players in a counter-operation that will be highly publicized propaganda.

So, one might ask, how can leaking the nation’s name, Afghanistan, almost certainly laundered via some CIA embed or ‘social justice’ source known to WikiLeaks, square with the USA purportedly concerned for the lives put at risk? Here is where the cynicism of evil plays in the world of spy craft; people at the top, certainly inclusive of Obama’s CIA Director John ‘Kill List‘ Brennan, NSA associates and ‘friends’ play the game of ‘trade-offs.’ The people whose lives are ‘at risk’ due to the disclosures will be relatively low level assets, easily expendable technicians. They are suddenly fodder for the greater gain of going after Greenwald and damaging The Intercept. It is actually as simple as that. If some of these technicians are killed, so much the better from the point of view at the top, that will be frosting on the cake of working to destroy (and likely pursue a frame-up with criminal charges) those persons who initially broke the Snowden story and facilitated the NSA documents release.

To Glenn & Co at The Intercept, welcome to the real world of spies.

Related stories:

Above Top Secret How (not) To Leak

WikiLeaks and Spy Agencies Probable information operations

%d bloggers like this: