True World Intelligence News (TWIN)

Voice of Truth: Proclaimer of truth and defender of the faithful

Archive for December 2013

Police State Alert: NSA Has Probably Intercepted Your Laptop and Illegally Planted Spyware Before You Bought It!

leave a comment »

The seal of the U.S. National Security Agency....

The seal of the U.S. National Security Agency. The first use was in September 1966, replacing an older seal which was used briefly. For more information, see here and here. (Photo credit: Wikipedia)

May God help us all when you consider the amount of kafka-esque monitoring of citizens being done in the name of protecting our “freedoms.” As Orwell warned us, Big Brother will tell us that War is Peace. As with spyware illegally planted on computers before they make it to stores, there is a political “malware” planted on our government called the Shadow Government, and it’s “hackers” are special interests, working for a foreign interests, whose main goal is to monitor citizens to identify those who are potential “enemies of the state” and those who will offer no resistance. Which one are you?

When agents with the NSA’s Tailored Access Operations (TAO) division want to infiltrate a network or a computer, they turn to their technical experts. This particular unit of the United States intelligence service is known internally as ANT. The acronym presumably stands for Advanced Network Technology, because that’s what the division produces — tools for penetrating network equipment and monitoring mobile phones and computers. ANT’s products help TAO agents infiltrate networks and divert or even modify data wherever the NSA’s usual methods won’t suffice. You can read more about the TAO division, its strengths and tricks in a SPIEGEL feature that was published in English on Sunday.

SPIEGEL has obtained an internal NSA catalog describing ANT’s various products, along with their prices. A rigged monitor cable, for example, which allows “TAO personnel to see what is displayed on the targeted monitor,” goes for $30 (€22). An “active GSM base station” that makes it possible to mimic the cell phone tower of a target network and thus monitor mobile phones, is available for $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data undetected via radio link, are available in packs of 50, for over $1 million.

Intelligence agencies, incidentally, are not the only ones using these types of devices. The same kind of modified USB plug played a role, for example, in a recent high-tech drug-smuggling case uncovered at the port of Antwerp, Belgium.

NSA malware has also been used against international telecommunications companies, such as partially state-owned Belgian company Belgacom and mobile phone billing service provider MACH. One internal NSA document dating from 2004 describes a spyware program called “VALIDATOR” by saying that it provides “unique backdoor access to personal computers of targets of national interest, including but not limited to terrorist targets.”

The NSA has also targeted products made by well-known American manufacturers and found ways to break into professional-grade routers and hardware firewalls, such as those used by Internet and mobile phone operators. ANT [used by NSA hackers] offers malware and hardware for use on computers made by Cisco, Dell, Juniper, Hewlett-Packard and Chinese company Huawei.

TAO’s implants, in place around the world, have played a significant role in the NSA’s ability to establish a global covert network consisting partly of the agency’s own hardware, but also of other computers subverted to serve its purposes.

Intercepting Packages and Manipulating Computers

ANT’s developers often seek to place their malicious code in BIOS, software located directly on a computer’s motherboard that is the first thing to load when the computer is turned on. Even if the hard drive is wiped and a new operating system installed, ANT’s malware continues to function, making it possible to later add other spyware back onto the computer.

Along with the BIOS software of computers and servers, the NSA’s hackers also attack firmware on computer hard drives, essentially the software that makes the hardware work. The ANT catalog includes, for example, spyware capable of embedding itself unnoticed into hard drives manufactured by Western Digital, Seagate and Samsung. The first two of these are American companies.

Many of these digital tools are “remotely installable,” meaning they can be put in place over the Internet. Others, however, require direct intervention, known in NSA jargon as “interdiction.” This means that brand new products being delivered by mail are secretly intercepted, and hardware or software implants installed on them. The package is forwarded to its intended destination only after this has been done.

In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States’ foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA’s radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

Workers at NSA’s target selection office, which also had Angela Merkel in its sights in 2002 before she became chancellor, sent TAO a list of officials within the Mexican Secretariat they thought might make interesting targets. As a first step, TAO penetrated the target officials’ email accounts, a relatively simple job. Next, they infiltrated the entire network and began capturing data.

Soon the NSA spies had knowledge of the agency’s servers, including IP addresses, computers used for email traffic and individual addresses of diverse employees. They also obtained diagrams of the security agencies’ structures, including video surveillance. It appears the operation continued for years until SPIEGEL first reported on it in October.

The technical term for this type of activity is “Computer Network Exploitation” (CNE). The goal here is to “subvert endpoint devices,” according to an internal NSA presentation that SPIEGEL has viewed. The presentation goes on to list nearly all the types of devices that run our digital lives — “servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc.” SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country’s critical infrastructure.

The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran’s nuclear program, and successfully so. The country’s nuclear program was set back by years after Stuxnet manipulated the SCADA control technology used at Iran’s uranium enrichment facilities in Natanz, rendering up to 1,000 centrifuges unusable.

Once TAO teams have gathered sufficient data on their targets’ habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service’s covert servers, known by the codename FOXACID.

One document labeled “top secret” and “not for foreigners” describes the NSA’s success in spying on the “SEA-ME-WE-4” cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.

The document proudly announces that, on Feb. 13, 2013, TAO “successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4).” With the help of a “website masquerade operation,” the agency was able to “gain access to the consortium’s management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network.”

To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren’t connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour’s work.

Written by voiceoftruthusa

December 30, 2013 at 8:59 pm

Police State Alert: India Cracks Down on a Bitcoin Trader. Bitcoin Seen as Threat to Central Bank?

leave a comment »

On Thursday, ED raided the premises of Mahim Gupta in Bopal area of the city who provides trading platform through his website -‑ During the preliminary investigation, the ED found that it is in clear violation of Foreign Exchange Management Act (FEMA) rules of the country as central bank does not provide permission to indulge in such transactions.

“We have found that through the website 400 persons have recorded 1,000 transactions that amount to a few crores of rupees. We are gathering the data of the transactions, name of the people who have transacted in the virtual currency from Gupta’s server that is hired in the US. At present, we believe that this is a violation of foreign exchange regulations of the country. If we are able to establish money laundering aspect then he can be arrested,” said a top ED official.

As per sources, a separate raid was also conducted in Satellite area of the city, however, the person the investigation agency was looking for could not be found. “When we reached his office, he was not there. We have sealed the premises,” the official added.

India’s Central Bank Says Bitcoins Have No Value Backing Them – Kinda Like Paper Currency

leave a comment »

English: Total Bitcoin supply over time. Start...

English: Total Bitcoin supply over time. Starting in 2009, the Bitcoin supply is created at a rate of approximately 50 bitcoins every 10 minutes. Every 210,000 generations (about every four years), the creation rate is cut in half (i.e. 50, 25, 12.5, 6.25, etc.) and tends to zero, such that there will never be more than 21 million total coins created. (Photo credit: Wikipedia)

India‘s largest bitcoin exchange service has suspended its operations, just when the most valuable currency in the world had begun to gain widespread recognition in the country. The central bank cautioned against the risks of using virtual currency.

The Reserve Bank of India has warned users, holders and traders  of virtual currencies, including bitcoins, about “potential  financial, legal, customer protection and security related  risks” they are exposing themselves to.

There is no underlying or backing of any asset for virtual  currencies. As such, their value seems to be a matter of  speculation,” the central bank contended in a statement, adding that the   huge volatility in the value of virtual currencies has  been noted, however.

The Reserve Bank of India emphasized that virtual currencies were  not authorized by any central bank or monetary authority,  thus posing serious risks to their users.  

“There have been several media reports of the usage of  virtual currencies, including bitcoins, for illicit and illegal  activities in several jurisdictions. The absence of information  of counterparties in such peer-to-peer anonymous/ pseudonymous  systems could subject the users to unintentional breaches of  anti-money laundering and combating the financing of terrorism  (AML/CFT) laws,” it stated.

Written by voiceoftruthusa

December 28, 2013 at 11:43 pm

U.S. vs India, Round 2: Are American Values Truly Reflected in Foreign Policy?

leave a comment »

…[D]iplomacy  operates on the principal of reciprocity and I’m afraid the  Americans have not shown the basic courtesies to our diplomat in  New York. And we have every right to retaliate with appropriate  measures of our own. This has not been savory at all. It’s been  rather nasty and we would have never wanted this in the first  place, but the US State Department has always applied double  standards. Think about the Raymond Davies case involving a US CIA  contractor undercover as a diplomat in Pakistan who killed two  citizens. President Obama came out at the time and put a lot of  pressure on Pakistan to save their so-called diplomat who was  actually a spy – and a killer to boot – and said “you know  there’s a broader principle at stake. This is diplomatic  immunity.” We use the same logic with this case. It was a far  smaller offense, it was a much less grave crime, it was a  domestic dispute between our diplomat and her domestic helper.  But they escalated it to a point where you know she was strip  searched and humiliated, so we have every right. US diplomats  often get away with a lot in many foreign postings and we have  been extending these courtesies because in diplomacy, you need to  do it in order for the relations to go ahead. But unfortunately  the Americans seem to have thought that India is a banana  republic and doesn’t have the spine to hit back. So we have taken  measures, but we hope that the Americans will see sense. US  Secretary of State John Kerry has expressed regrets, but that is  actually insufficient because we have been demanding a firmer  apology. But nonetheless, I think they will see sense because  reciprocity means if you do bad you will also get bad. If You  give respect, you get respect…the Indians are sending a  clear message that we want to be with the US as equals; not as  superordinate and subordinate. The world has changed and it needs  to adjust its lenses; [the US] cannot have double standards

Sreeram Chaulia, Dean of Jindal School of International Affairs

Police State Alert: U.S. Gov’t Gets Green Light to Continue War on Citizens and Privacy

leave a comment »

Over 12 years since the Sept 11 attacks, the U.S Government still fails at protecting airports, as we’ve seen with attacks at LAX Airport in L.A., and now two major security breaches at the Newark, NJ and Phoenix airports. Yet, intelligence agencies have been successful in hacking personal and business computers all across American and around the world.


And now some federal judge has declared that all of the illegal hacking activities of the NSA (and by proxy, the FBI and CIA) are legal! Very interesting times we live in indeed. Notice in the article snippet below that the judge is using the actions of Al Qaeda as a justification for NSA activities, even though it has been well established here and elsewhere that the U.S. and its allies conveniently created Al Qaeda to have an excuse to dominate the Middle East and the entire planet. Let’s hope that someone with some sense takes this to the Supreme Court, and that cooler heads in the highest court prevail.

U.S. judge upholds NSA phone surveillance program

(Reuters) – A U.S. judge ruled the National Security Agency’s program that collects records of millions of Americans’ phone calls is lawful, rejecting a challenge by the American Civil Liberties Union to the controversial counter-terrorism program.

Friday’s decision by U.S. District Judge William Pauley in Manhattan diverges from a December 16 ruling by U.S. District Judge Richard Leon in Washington, D.C., who said the “almost Orwellian” program was likely unconstitutional.

The program’s existence had first been disclosed by Edward Snowden, the former NSA contractor whose leaks have detailed the breadth of U.S. electronic surveillance and sparked a debate over how much leeway to give the government in protecting Americans from terrorism.

In a 54-page decision, Pauley said the program “vacuums up information about virtually every telephone call to, from, or within the United States.”

But he said the program’s constitutionality “is ultimately a question of reasonableness,” and that there was no evidence that the government had used “bulk telephony metadata” for any reason other than to investigate and disrupt terrorist attacks.

Technology allowed al Qaeda to operate decentralized and plot international terrorist attacks remotely,” Pauley wrote. “The bulk telephony metadata collection program represents the government’s counter-punch.”

It is time to use the power of the vote to make sure we get citizen-friendly judges, not pro-NSA judges.

Here is an unfortunate casualty of the so-called War on Terror (aka War on Earth’s Citizens):

How economic warfare killed the People’s Bank

London Mayor Boris Johnson calls it ‘soft power’ but the big guns have opened up on Western civilization.

The ‘War on Terror’ is the mainstream media’s name for  the Western power elite’s crusade to destroy the very concept of  an earth freely given to its inhabitants. Driven by insatiability  for ever more power in the face of their own criminality, their  aim is to own the earth and everything in it. Even the millions  profiting from their Quantitative Easing (QE) now, in the casino  economy, are ultimately doomed to become their victims.

The call now is as stark as that declared by Britain’s wartime  leader Sir Winston Churchill on 18th June 1940: “The Battle  of Britain is about to begin. Upon this battle depends the  survival of Christian civilization.” The world had better  understand how it is being fought if Christian or any other  civilization is to survive the coming military, economic and  environmental crises.

This war is as much for the control of territory and natural  resources as any other, but much of NATO countries’ war fighting  resources are going into what London’s conservative mayor and  former member of Oxford’s elite Bullingdon Club, Boris Johnson,  calls “soft power”. Chief among these coercive  instruments are economic, psychological, cyber, SigInt [Signals  Intelligence] and space warfare. The shift to these new  battlefields is to wrong-foot two different ‘target’ audiences:  both the ‘enemy’ and the West’s domestic populations.

This shift in emphasis, by the military and commercial partners  they steal resources and territory for, signals the rise of the  totalitarianism the world hoped had been banished forever in  1945. All honest brokers are being eliminated: the post-9/11  world has seen institutions critical to national security, key  financial, military and cultural infrastructure all keeling over  in the cross-hairs.

Pentagon’s Information Operations illegally targeting senators

As foreign wars are failing, this 21st century war fighting  machinery, like the ‘Eye of Sauron’ in J.R.R. Tolkein’s   ‘Lord of the Rings’, is being turned against activists,  politicians and journalists in the domestic populations.

US Investigative Journalist Michael Hastings told an incredible  story when he returned from his 2010 trip, embedded with US  general Stanley McChrystal in Afghanistan. The Pentagon, he  revealed in his award winning book ‘The Operators’,  spends $4.7bn of public money annually employing 27,000  psychological operations, marketing and public relations staff  around the world. Their daily mission: to push the Pentagon line  into the West’s national newspapers and broadcast bulletins.

Lose The Burners: Court Okays Prepaid Phone Tracking

Appeals court rules law enforcement agencies don’t need a warrant to “ping” and track prepaid cellphone locations.

Prepaid cellphone users may be tracked by law enforcement agencies at any time, without police first having to obtain a probable-cause warrant.

That’s one takeaway from a 23-page ruling issued Tuesday by the U.S. Court of Appeals for the Sixth Circuit. The ruling centers around a case involving Melvin Skinner, who was convicted by a jury of drug trafficking and money laundering for his role in what the court described as “a large-scale drug-trafficking operation.”

How to Check Which Gov’t Agency is Spying on Your Smartphone

In our post-Snowden world, everyone almost accepts that some gov’t agency or another will be scanning their phone calls and data transmissions. Most people just accept this, and hope for that it’s not really happening.

Here’s a way to check, and see for yourself (instructional video below).

When blogger Alex Heid performed this simple check from his location in the United States, he quickly discovered that his phone was being routed through a British Ministry of Defence, most likely being analysed by GCHQ. Alex was using a pre-paid mobile/cell phone carrier.

Both George Orwell and Ford Motor founder Henry Ford essentially warned us that the 20th century marked the first time that big government would use words whose meaning was the opposite of what the masses thought. For instance, the U.S. renamed the War Department into the Department of Defense. It is well known that the Dept of Defense is really the Dept of Offense. Social Security is really insecurity. The Federal Reserve is not federal nor does it have any reserves. The War on Terror is really War by Terror (terror on citizens, not Al Qaeda, which is a Frankenstein creation of the West). Peace is War…

A Glimpse of America’s Future Police State

leave a comment »

Immigrant rights march for amnesty in downtown...

Immigrant rights march for amnesty in downtown Los Angeles, California on May Day, 2006. (Photo credit: Wikipedia)

It is sad that so many false flag, deceptive operations have been executed across America, from Boston to Los Angeles, that police have started evolving into anti-American gestapo units. It is not too late to reclaim America for true Americans and make a stand for Christian principles before the darkness completely takes over. Click here for A Glimpse of America’s Future Police State

Written by voiceoftruthusa

December 25, 2013 at 4:35 am

Merry Christmas! Why the War Against Christmas Will Never Prevail

leave a comment »

Written by voiceoftruthusa

December 24, 2013 at 3:53 pm

Posted in Uncategorized

U.S. Government to Continue Its War On All Americans

leave a comment »

English: President George W. Bush and Presiden...

English: President George W. Bush and President-elect Barack Obama meet in the Oval Office of the White House Monday, November 10, 2008. (Photo credit: Wikipedia)

Clearly, when any government uses the same spying and various surveillance techniques on its own citizens that it uses against hostile foreign military and government officials, then common sense would conclude that such a government is at war with the citizens.

U.S. reasserts need to keep domestic surveillance secret

By Ellen Nakashima,   Published: December 21

The Obama administration Friday reasserted its claim of ­state-secrets privilege to try to block a court from ruling on the constitutionality of the National Security Agency’s interception of e-mails and phone calls on U.S. soil without a warrant.

The reassertion of the privilege in two long-running lawsuits comes despite recent disclosures about the NSA’s programs and as President Obama is considering curbs to the NSA’s programs based on recommendations by a review panel he appointed.

“In my judgment, disclosure of still-classified details regarding these intelligence-gathering activities, either directly or indirectly, would seriously compromise, if not destroy, important and vital ongoing intelligence operations,” Director of National Intelligence James R. Clapper said in a declaration filed in U.S. District Court in Northern California on Friday.

In court filings, the government also acknowledged for the first time that sweeping collections of Americans’ phone and Internet metadata began under the Bush administration, in concert with a program of intercepting phone and e-mail content without warrants — programs that operated for years solely under executive power before being brought under court and congressional oversight. Clapper said in his declaration that President George W. Bush authorized the collection efforts on Oct. 4, 2001, after the Sept. 11 terrorist attacks.

Despite that declassification, he said, revealing other information about the programs would compromise their effectiveness. The lawsuits are challenging the warrantless surveillance of phone call and e-mail content, and one of them focuses as well on the collection of data on phone calls.

The government is asking the court to dismiss the two cases on grounds that the plaintiffs, Carolyn Jewel and Virginia Shubert, have not proven they were monitored by the NSA’s interception of their phone calls or e-mails. To prove that they were would require disclosure of collection techniques that could cause “exceptionally grave damage” to national security, officials said.

Jewel is suing on behalf of all AT&T customers, and Shubert is suing on behalf of all Americans.

“As a matter of course, the NSA cannot publicly confirm or deny whether any individual is or has been subject to intelligence gathering, because to do so would tend to reveal actual targets or subjects,” said Frances J. Fleisch, acting NSA deputy director, in a declaration also filed Friday.

But Cindy Cohn, legal director for the Electronic Frontier Foundation, which is representing the plaintiffs, said the government’s claim that information about whether they are indiscriminately collecting Americans’ communications is still secret “ridiculous at this point.”

White House to preserve controversial policy on NSA, Cyber Command leadership

By Ellen Nakashima,   Published: December 13

The Obama administration has decided to preserve a controversial arrangement under which a single military official is permitted to direct both the National Security Agency and the military’s cyberwarfare command despite an external review panel’s recommendation against doing so, according to U.S. officials.

The decision by President Obama comes amid signs that the White House is not inclined to place significant new restraints on the NSA’s activities and favors maintaining an agency program that collects data on virtually all phone calls of Americans, although it is likely to impose additional privacy-protection measures.

Some officials, including top U.S. intelligence officials, had argued that the NSA and Cyber Command should be placed under separate leadership to ensure greater accountability and avoid an undue concentration of power.

“Following a thorough interagency review, the administration has decided that keeping the positions of NSA Director and Cyber Command commander together as one, dual-hatted position is the most effective approach to accomplishing both agencies’ missions,” White House spokeswoman Caitlin Hayden said in an e-mail to The Washington Post.

India Really Mad at U.S. – Popular Protests in Streets of Southern India

with one comment

English: Map of the world showing the location...

English: Map of the world showing the location of India and the United States of America. (Photo credit: Wikipedia)

Protesters have taken to the streets in southern Indian city of Chennai, demanding an apology from the US over the arrest and mistreatment of an Indian diplomat in New York.

The march on the streets of Chennai was organized by student organizations.

The protesters called for an apology from the US government over the arrest of an Indian diplomat, urging New Delhi to be stricter on the issue.

The aftershocks of a diplomatic row between the United States and India are still felt.

Two weeks ago, New York police arrested and strip-searched Devyani Khobragade, a member of India’s diplomatic mission. She has been accused of visa fraud and making false statements about her housekeeper.

Her maltreatment caused anger in India and sparked a series of reprisals, including the removal of protective barricades outside the US Embassy in New Delhi.

Written by voiceoftruthusa

December 21, 2013 at 6:02 pm

Sleeping With the Al Qaeda Enemy: When Petrodollars and Foriegn Intrigue Drags the U.S. into Darkness

leave a comment »

Pete Souza, Official White House Photographer

Pete Souza, Official White House Photographer (Photo credit: Wikipedia)

US Government Protection of Al-Qaeda Terrorists and the US-Saudi Black Hole

Peter Dale Scott

For almost two centuries American government, though always imperfect, was also a model for the world of limited government, having evolved a system of restraints on executive power through its constitutional arrangement of checks and balances. Since 9/11 however, constitutional practices have been overshadowed by a series of emergency measures to fight terrorism. The latter have mushroomed in size, reach and budget, while traditional government has shrunk. As a result we have today what the journalist Dana Priest has called two governments: the one its citizens were familiar with, operated more or less in the open: the other a parallel top secret government whose parts had mushroomed in less than a decade into a gigantic, sprawling universe of its own, visible to only a carefully vetted cadre – and its entirety…visible only to God.1 More and more, it is becoming common to say that America, like Turkey before it, now has what Marc Ambinder and John Tirman have called a deep state behind the public one.2 And this parallel government is guided in surveillance matters by its own Foreign Intelligence Surveillance Court, known as the FISA court, which according to the New York Times, “has quietly become almost a parallel Supreme Court.”3

Thanks largely to Edward Snowden, it is now clear that the FISA Court has permitted this deep state to expand surveillance beyond the tiny number of known and suspected Islamic terrorists, to any incipient protest movement that might challenge the policies of the American war machine. Americans have by and large not questioned this parallel government, accepting that sacrifices of traditional rights and traditional transparency are necessary to keep us safe from al-Qaeda attacks.

However secret power is unchecked power, and experience of the last century has only reinforced the truth of Lord Acton’s famous dictum that unchecked power always corrupts. It is time to consider the extent to which American secret agencies have developed a symbiotic relationship with the forces they are supposed to be fighting – and have even on occasion intervened to let al-Qaeda terrorists proceed with their plots. …

“Intervened to let al-Qaeda terrorists proceed with their plots”? These words as I write them make me wonder yet again, as I so often do, if I am not losing my marbles, and proving myself to be no more than a zany “conspiracy theorist.” Yet I have to remind myself that my claim is not one coming from theory, but rests on certain undisputed facts about incidents that are true even though they have been systematically suppressed or under-reported in the American mainstream media. More telling, I am describing a phenomenon that occurred not just once, but consistently, almost predictably.

We shall see that, among the al-Qaeda terrorists who were first protected and then continued their activities were

1) Ali Mohamed, identified in the 9/11 Commission Report (p. 68) as the leader of the 1998 Nairobi Embassy bombing;

2) Mohammed Jamal Khalifa, Osama bin Laden’s close friend and financier, while in the Philippines, of Ramzi Yousef (principal architect of the first WTC attack) and his uncle Khalid Sheikh Mohammed;

3) Khalid Sheikh Mohammed, identified in the 9/11 Commission Report (p. 145) as “the principal architect of the 9/11 attacks.”

4) Khalid al-Mihdhar and Nawaf al-Hazmi, two of the alleged 9/11 hijackers, whose presence in the United States was concealed from the FBI by CIA officers for months before 9/11.4

It might sound from these three citations as if the 9/11 Commission marked a new stage in the U.S. treatment of these terrorists, and that the Report now exposed those terrorists who in the past had been protected. On the contrary, a principal purpose of my essay is to show that

1) one purpose of protecting these individuals had been to protect a valued intelligence connection (the “Al-Qaeda connection” if you will);

2) one major intention of the 9/11 Commission Report was to continue protecting this connection;

3) those on the 9/11 Commission staff who were charged with this protection included at least one commission member (Jamie Gorelick), one staff member (Dietrich Snell) and one important witness (Patrick Fitzgerald) who earlier had figured among the terrorists’ protectors.

In the course of writing this essay, I came to another disturbing conclusion I had not anticipated. This is that a central feature of the protection has been to defend the 9/11 Commission’s false picture of al-Qaeda as an example of non-state terrorism, at odds with not just the CIA but also the royal families of Saudi Arabia and Qatar. In reality, as I shall show, royal family protection from Qatar and Saudi Arabia (concealed by the 9/11 Commission) was repeatedly given to key figures like Khalid Sheikh Mohammed, the alleged “principal architect of the 9/11 attacks.”

This finding totally undermines the claim that the wars fought by America in Asia since 9/11 have been part of a global “war on terror.” On the contrary, the result of the wars has been to establish a permanent U.S. military presence in the oil- and gas-rich regions of Central Asia, in alliance with Saudi Arabia, Qatar, and Pakistan – the principal backers of the jihadi terrorist networks the U.S. has been supposedly fighting. Meanwhile the most authentic opponents in the region of these Sunni jihadi terrorists – the governments of Iraq, Libya, Syria, and Iran – have been overthrown by U.S. invasion or military support (in the case of Iraq and Libya) subverted with U.S. support (in the case of Syria), or sanctioned and threatened as part of an “axis of evil” (in the case of Iran).

The protection to terrorists described in this essay, in other words, has been sustained partly in order to support the false premises that have underlain U.S. Asian wars for more than a decade. And the blame cannot be assigned all to the Saudis. Two months before 9/11, FBI counterterrorism expert John O’Neill described to the French journalist Jean-Charles Brisard America’s “impotence” in getting help from Saudi Arabia concerning terrorist networks. The reason? In Brisard’s paraphrase, “Just one: the petroleum interests.”5 Former CIA officer Robert Baer voiced a similar complaint about the lobbying influence of “the Foreign Oil Companies Group, a cover for a cartel of major petroleum companies doing business in the Caspian. . . . The deeper I got, the more Caspian oil money I found sloshing around Washington.”

In 1993, MOHAMED advised the Royal Canadian Mounted Police (“RCMP”) that he had provided intelligence and counter-intelligence training in Afghanistan to a particular individual…. MOHAMED admitted that he had travelled to Vancouver, Canada, in the spring of 1993 to facilitate the entry of that individual into the United States…. MOHAMED further admitted that he and the individual had transported Osama bin Laden from Afghanistan to the Sudan in 1991…. MOHAMED told the RCMP that he was in the process of applying for a job as an FBI interpreter and did not want this incident to jeopardize the application. (In fact, MOHAMED then had such an application pending though he was never hired as a translator.)21 Like the American media, this FBI affidavit suppressed the fact that Mohamed, an admitted ally of Osama bin Laden caught red-handed with another known terrorist, was released on orders from the FBI.

The Two Levels of American History: Official History and Deep History

The whole episode illustrates what has become all too common in recent American history, the way in which secret bureaucratic policies can take priority over the public interest, even to the point of leading to mass murder.

Read more at:

Written by voiceoftruthusa

December 15, 2013 at 11:50 pm