30th Anniversary Edition ~ Sovereign’s Handbook by Johnny Liberty Now Available! | Liberty International

If you have ever heard talk or been to a seminar about “sovereignty”, then very likely those conversations were influenced by the foundational research of the author and educator.

His research and educational journey reaching millions of people worldwide began in 1992 and culminated in 2022 with the 3-Volume book release – his final word on the subject.

At the turn of the millennium his books and audio courses facilitated in part –  a sovereignty and tax-honesty movement that involved millions of Americans.

This 3 Volume series comprises the life’s work of Johnny Liberty filled with comprehensive insights into the last few hundred years of history, law, economics, money, citizenship and governance. 

These books show how it is supposed to be done in a constitutional Republic. 

How did We the People get to where we are today? 

What can we do to reclaim our inherent sovereignty and natural rights? 

Many of the answers may be found within these revolutionary pages. Available as a paperback, E-Book (PDF) or an Amazon Kindle format. Thank you for supporting the author. 

Sincerely, 

With Freedom For All, 
~ Johnny Liberty

Sovereign’s Handbook by Johnny Liberty (30th Anniversary Edition)

  • A three-volume, 750 page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook.
  • Still after all these years, it is the most comprehensive book on sovereignty, economics, law, power structures and history ever written.
  • Served as the primary research behind the best-selling Global One Audio Course.
  • ORDER NOW!
  • $99.99 ~ THREE VOLUME PRINT SERIES
  • $33.33 ~ THREE VOLUME E-BOOK

The 3 Volume Sovereign’s Handbook by Johnny Liberty is textbook material for everyone including educators/teachers, homeschoolers, historians, activists, leaders/politicians, attorneys/judges/law schools, police officers, and state Citizens/Nationals. 

Order Additional Books, Audios & Videos from The Freedom Catalog: LibertyInternationalBooks.com 
Sovereign’s Handbook (Website): http://SovereignsHandbook.com 
Dawning of the Corona Age (Website): DawningoftheCoronaAge.com 
Liberty International News: http://LibertyInternational.news 

ORDER YOUR LIBERTY BOOKS TODAY!

Sovereign’s Handbook by Johnny Liberty 
(30th Anniversary Edition)
(3-Volume Printed, Bound Book or PDF)

A three-volume, 750+ page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook. Still after all these years, this is the most comprehensive book on sovereignty, economics, law, power structures and history ever written. Served as the primary research behind the best-selling Global One Audio Course. Available Now!

$99.95 ~ THREE-VOLUME PRINT SERIES
$33.33 ~ THREE-VOLUME EBOOK

Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom 
(3rd Edition)
(Printed, Bound Book or PDF)

This comprehensive book, goes far beyond the immediate impact of the “pandemic”, but, along with the reader, imagines how our human world may be altered, both positively and negatively, long into an uncertain future. Available Now!

$25.00 ~ PRINT BOOK
$10.00 ~ EBOOK

THRIVE II: This is What it Takes

After watching the film “THRIVE II: This Is What It Takes” twice and taking copious notes throughout, Happy and I have concluded that this is one of the most profound and important documentaries for ushering in a truly sustainable future for life on Earth.

Besides claiming individual sovereignty as the context for taking back ones power from external authority, an enlightened and technologically advanced civilization based on connected resonance with the unified field is not only possible, but absolutely essential for continuing the diversity and health of all life on Earth.

Kudos to Foster and Kimberly Gamble for having the courage and foresight to bring these discoveries to light and sharing them with the rest of us. This film is a must watch for every conscious human being.

Source: ThriveOn.com

Court Forces Release of Clinton Wikileaks discussion email that confirms State Department knew about her email account | Judicial Watch

Editor’s Note: There is a long chain of events leading to this misguided impeachment inquiry initiated by the Democrats in the House of Representatives and it began during the Obama Administration when Hillary Clinton was Secretary of State. She was breaking with long-standing national security procedures by establishing a private server for her government and personal communications and the State Department knew she was doing this all along. Here’s the proof.

Judicial Watch announced today that the State Department provided a previously hidden email which shows that top State Department officials used and were aware of Hillary Clinton’s email account.

On December 24, 2010, Daniel Baer, an Obama State Department deputy assistant secretary of state, writes to Michael Posner, a then-assistant secretary of state about Clinton’s private email address:

Baer: “Be careful, you just gave the secretary’s personal email address to a bunch of folks …”

Posner answers: “Should I say don’t forward? Did not notice”

Baer responds: “Yeah-I just know that she guards it pretty closely”

Mr. Posner had forwarded Clinton’s email address, which was contained in an email sent to State Department senior leadership, about WikiLeaks.

It appears the State Department produced this email in 2016 in redacted form, blacking out Clinton’s personal email address and the discussion about Clinton’s wanting to keep her email address closely guarded.

Judicial Watch sought the email after a former top Freedom of Information Act (FOIA) State Department official testified to Judicial Watch about reviewing it between late 2013 and early 2014.

The testimony and the email production comes in discovery granted to Judicial Watch on the Clinton email issue in a FOIA lawsuit (Judicial Watch v. U.S. Department of State (No. 1:14-cv-01242)). Clinton also faces potential questioning under oath in this lawsuit.

Despite a recent court order requiring production of the email, the DOJ and State Departments only produced it 10 days ago after Judicial Watch threatened to seek a court order to compel its production.

“Judicial Watch just caught the State Department and DOJ red-handed in another email cover-up – they all knew about the Clinton email account but covered up the smoking-gun email showing this guilty knowledge for years,” stated Judicial Watch President Tom Fitton.

The scope of court-ordered discovery that produces this email find includes: whether Secretary Clinton used private email in an effort to evade the Freedom of Information Act (FOIA); whether the State Department’s attempt to settle this FOIA case in 2014 and 2015 amounted to bad faith; and whether the State Department has adequately searched for records responsive to Judicial Watch’s FOIA request.

During a recent hearing, Judge Lamberth specifically raised concerns about a Clinton email cache, carterheavyindustries@gmail.com, discussed in a letter to Senator Charles Grassley (R-IA) and wants Judicial Watch to “shake this tree” on this issue.

Judge Lamberth also criticized the State Department’s handling and production of Clinton’s emails in this case stating, “There is no FOIA [Freedom of Information Act] exemption for political expedience, nor is there one for bureaucratic incompetence.” 

The court rejected DOJ and State efforts to derail further Judicial Watch discovery. Judge Lamberth called their arguments “preposterous” and cited a prior Judicial Watch FOIA case in which he ordered U.S. Marshals to seize records from a Clinton administration official.

Judge Lamberth detailed how the State Department “spent three months from November 2014 trying to make this case disappear,” and that after discovering the State Department’s actions and omissions, “Now we know more, but we have even more questions than answers. So I won’t hold it against Judicial Watch for expanding their initial discovery request now.”

Judge Lamberth stated his goal was to restore the public’s faith in their government, which may have been damaged because of the Clinton email investigation.

The court granted Judicial Watch seven additional depositions, three interrogatories and four document requests related to former Secretary of State Hillary Clinton’s use of a private email server. Hillary Clinton and her former top aide and current lawyer Cheryl Mills were given 30 days to oppose being deposed by Judicial Watch.

On December 6, 2018, Judge Lamberth ordered Obama administration senior State Department officials, lawyers and Clinton aides to be deposed or answer written questions under oath. The court ruled that the Clinton email system was “one of the gravest modern offenses to government transparency.”

This Judicial Watch FOIA lawsuit led directly to the disclosure of the Clinton email system in 2015.

Judicial Watch’s discovery over the last several months found many more details about the scope of the Clinton email scandal and cover-up:

  • John Hackett, former Director of Information Programs and Services (IPS) testified under oath that he had raised concerns that former Secretary of State Hillary Clinton’s staff may have “culled out 30,000” of the secretary’s “personal” emails without following strict National Archives standards. He also revealed that he believed there was interference with the formal FOIA review process related to the classification of Clinton’s Benghazi-related emails.
  • Heather Samuelson, Clinton’s White House liaison at the State Department, and later Clinton’s personal lawyer, admitted under oath that she was granted immunity by the Department of Justice in June 2016.
  • Justin Cooper, former aide to President Bill Clinton and Clinton Foundation employee who registered the domain name of the unsecure clintonemail.com server that Clinton used while serving as Secretary of State, testified he worked with Huma Abedin, Clinton’s deputy chief of staff, to create the non-government email system.
  • In the interrogatory responses of E.W. (Bill) Priestap, assistant director of the FBI Counterintelligence Division, he stated that the agency found Clinton email records in the Obama White House, specifically, the Executive Office of the President.
  • Jacob “Jake” Sullivan, Clinton’s senior advisor and deputy chief of staff when she was secretary of state, testified that both he and Clinton used her unsecure non-government email system to conduct official State Department business.
  • Eric Boswell, former assistant secretary of state for diplomatic security during Clinton’s tenure as secretary of state, testified that Clinton was warned twice against using unsecure BlackBerry’s and personal emails to transmit classified material.

Source: Judicial Watch

NY Times admits it sends stories to US government (i.e. national security officials) for approval before publication | The Gray Zone

new-york-times-buildingBy Ben Norton

Editor’s Note: We’ve long understood the entanglement between the mainstream press and the national security system. This article gives us some deeper insight.

The New York Times has publicly acknowledged that it sends some of its stories to the US government for approval from “national security officials” before publication.

This confirms what veteran New York Times correspondents like James Risen have said: The American newspaper of record regularly collaborates with the US government, suppressing reporting that top officials don’t want made public.

On June 15, the Times reported that the US government is escalating its cyber attacks on Russia’s power grid. According to the article, “the Trump administration is using new authorities to deploy cybertools more aggressively,” as part of a larger “digital Cold War between Washington and Moscow.”

In response to the report, Donald Trump attacked the Times on Twitter, calling the article “a virtual act of Treason.”

The New York Times PR office replied to Trump from its official Twitter account, defending the story and noting that it had, in fact, been cleared with the US government before being printed.

“Accusing the press of treason is dangerous,” the Times communications team said. “We described the article to the government before publication.”

“As our story notes, President Trump’s own national security officials said there were no concerns,” the Times added.

Indeed, the Times report on the escalating American cyber attacks against Russia is attributed to “current and former [US] government officials.” The scoop in fact came from these apparatchiks, not from a leak or the dogged investigation of an intrepid reporter.

‘Real’ journalists get approval from ‘national security’ officials

The neoliberal self-declared “Resistance” jumped on Trump’s reckless accusation of treason (the Democratic Coalition, which boasts, “We help run #TheResistance,” responded by calling Trump “Putin’s puppet”). The rest of the corporate media went wild.

But what was entirely overlooked was the most revealing thing in the New York Times’ statement: The newspaper of record was essentially admitting that it has a symbiotic relationship with the US government.

In fact, some prominent American pundits have gone so far as to insist that this symbiotic relationship is precisely what makes someone a journalist.

In May, neoconservative Washington Post columnist Marc Thiessen — a former speechwriter for President George W. Bush — declared that WikiLeaks publisher and political prisoner Julian Assange is “not a journalist”; rather, he is a “spy” who “deserves prison.” (Thiessen also once called Assange “the devil.”)

What was the Post columnist’s rationale for revoking Assange’s journalistic credentials?

Unlike “reputable news organizations, Assange did not give the U.S. government an opportunity to review the classified information WikiLeaks was planning to release so they could raise national security objections,” Thiessen wrote. “So responsible journalists have nothing to fear.”

In other words, this former US government speechwriter turned corporate media pundit insists that collaborating with the government, and censoring your reporting to protect so-called “national security,” is definitionally what makes you a journalist.

This is the express ideology of the American commentariat.

NY Times editors ‘quite willing to cooperate with the government’

The symbiotic relationship between the US corporate media and the government has been known for some time. American intelligence agencies play the press like a musical instrument, using it it to selectively leak information at opportune moments to push US soft power and advance Washington’s interests.

But rarely is this symbiotic relationship so casually and publicly acknowledged.

In 2018, former New York Times reporter James Risen published a 15,000-word article in The Intercept providing further insight into how this unspoken alliance operates.

Risen detailed how his editors had been “quite willing to cooperate with the government.” In fact, a top CIA official even told Risen that his rule of thumb for approving a covert operation was, “How will this look on the front page of the New York Times?”

There is an “informal arrangement” between the state and the press, Risen explained, where US government officials “regularly engaged in quiet negotiations with the press to try to stop the publication of sensitive national security stories.”

“At the time, I usually went along with these negotiations,” the former New York Times reported said. He recalled an example of a story he was writing on Afghanistan just prior to the September 11, 2001 attacks. Then-CIA Director George Tenet called Risen personally and asked him to kill the story.

“He told me the disclosure would threaten the safety of the CIA officers in Afghanistan,” Risen said. “I agreed.”

Risen said he later questioned whether or not this was the right decision. “If I had reported the story before 9/11, the CIA would have been angry, but it might have led to a public debate about whether the United States was doing enough to capture or kill bin Laden,” he wrote. “That public debate might have forced the CIA to take the effort to get bin Laden more seriously.”

This dilemma led Risen to reconsider responding to US government requests to censor stories. “And that ultimately set me on a collision course with the editors at the New York Times,” he said.

“After the 9/11 attacks, the Bush administration began asking the press to kill stories more frequently,” Risen continued. “They did it so often that I became convinced the administration was invoking national security to quash stories that were merely politically embarrassing.”

In the lead-up to the Iraq War, Risen frequently “clashed” with Times editors because he raised questions about the US government’s lies. But his stories “stories raising questions about the intelligence, particularly the administration’s claims of a link between Iraq and Al Qaeda, were being cut, buried, or held out of the paper altogether.”

The Times’ executive editor Howell Raines “was believed by many at the paper to prefer stories that supported the case for war,” Risen said.

In another anecdote, the former Times journalist recalled a scoop he had uncovered on a botched CIA plot. The Bush administration got wind of it and called him to the White House, where then-National Security Adviser Condoleezza Rice ordered the Times to bury the story.

Risen said Rice told him “to forget about the story, destroy my notes, and never make another phone call to discuss the matter with anyone.”

“The Bush administration was successfully convincing the press to hold or kill national security stories,” Risen wrote. And the Barack Obama administration subsequently accelerated the “war on the press.”

CIA media infiltration and manufacturing consent

In their renowned study of US media, “Manufacturing Consent: The Political Economy of the Mass Media,” Edward S. Herman and Chomsky articulated a “propaganda model,” showing how “the media serve, and propagandize on behalf of, the powerful societal interests that control and finance them,” through “the selection of right-thinking personnel and by the editors’ and working journalists’ internalization of priorities and definitions of newsworthiness that conform to the institution’s policy.”

But in some cases, the relationship between US intelligence agencies and the corporate media is not just one of mere ideological policing, indirect pressure, or friendship, but rather one of employment.

In the 1950s, the CIA launched a covert operation called Project Mockingbird, in which it surveilled, influenced, and manipulated American journalists and media coverage, explicitly in order to direct public opinion against the Soviet Union, China, and the growing international communist movement.

Legendary journalist Carl Bernstein, a former Washington Post reporter who helped uncover the Watergate scandal, published a major cover story for Rolling Stone in 1977 titled “The CIA and the Media: How America’s Most Powerful News Media Worked Hand in Glove with the Central Intelligence Agency and Why the Church Committee Covered It Up.”

Bernstein obtained CIA documents that revealed that more than 400 American journalists in the previous 25 years had “secretly carried out assignments for the Central Intelligence Agency.”

Bernstein wrote:

“Some of these journalists’ relationships with the Agency were tacit; some were explicit. There was cooperation, accommodation and overlap. Journalists provided a full range of clandestine services—from simple intelligence gathering to serving as go‑betweens with spies in Communist countries. Reporters shared their notebooks with the CIA. Editors shared their staffs. Some of the journalists were Pulitzer Prize winners, distinguished reporters who considered themselves ambassadors without‑portfolio for their country. Most were less exalted: foreign correspondents who found that their association with the Agency helped their work; stringers and freelancers who were as interested in the derring‑do of the spy business as in filing articles; and, the smallest category, full‑time CIA employees masquerading as journalists abroad. In many instances, CIA documents show, journalists were engaged to perform tasks for the CIA with the consent of the managements of America’s leading news organizations.”

Virtually all major US media outlets cooperated with the CIA, Bernstein revealed, including ABC, NBC, the AP, UPI, Reuters, Newsweek, Hearst newspapers, the Miami Herald, the Saturday Evening Post, and the New York Herald‑Tribune.

However, he added, “By far the most valuable of these associations, according to CIA officials, have been with the New York Times, CBS and Time Inc.”

These layers of state manipulation, censorship, and even direct crafting of the news media show that, as much as they claim to be independent, The New York Times and other outlets effectively serve as de facto spokespeople for the government — or at least for the US national security state.

Source: The Gray Zone

Assange psychologically tortured to ‘breaking point’ by ‘democratic states,’ UN rapporteur tells RT | RT.com

Jailed WikiLeaks co-founder Julian Assange shows clear signs of degrading and inhumane treatment which only adds to his deteriorating health, UN Special Rapporteur on Torture Nils Melzer told RT.

Assange has “all the symptoms typical for a person who has been exposed to prolonged psychological torture,” Melzer told RT’s Afshin Rattansi. This adds to the toll of his deteriorating physical state caused by a lack of adequate medical care for several years, he said.

Melzer said he was judging from two decades of experience in working with POWs and political prisoners, and only after applying “scientific” UN methods to assess Assange’s condition. But the journalist’s case still “shocked” him.

An individual has been isolated and singled out by several democratic states, and persecuted systematically… to the point of breaking him.

Earlier this month, a UK court sentenced the WikiLeaks co-founder to nearly a year in jail for skipping bail in 2012. The courts are now deciding whether to extradite Assange to the US where he is wanted for 17 charges under the Espionage Act. He can end up serving up to 175 years in prison if proven guilty.

Also in May, Sweden reopened an investigation into the allegations of rape by Assange, which he denies. The probe was originally dropped in 2017.

WikiLeaks warned that the journalist’s health had “significantly deteriorated” during the seven years he spent living in the Ecuadorian Embassy in London, and continued to worsen after he was evicted in April and placed in a British prison. According to WikiLeaks, he was recently moved to the prison’s “hospital wing.”

 

Conspiracy Theories That Became Conspiracy Facts | Mint Press News

Camp David Accords IntelligenceBy Jake Anderson

Sometimes conspiracy theories turn out to be true. Therefore, it’s worth assessing them, even if their claims appear wholly outlandish. Especially if their claims appear wholly outlandish.

Generally speaking, conspiracy theories form where there is a vacuum of verifiable facts associated with a controversial, usually tragic event. The concept has evolved over the years and is a part of our popular culture.

There are legions of conspiracy theorists and “truthers” who have devoted their lives to certain theories, and there are legions of skeptics who have devoted their lives to debunking those theories. All the while, conspiracy theories of every stripe and variety festoon the footnotes of history. Even the origin of the phrase itself is subject to conspiracy theory, as some researchers have argued that the CIA invented and promulgated the term in order to marginalize fringe thinkers and neutralize investigations.

The internet has obviously had a profound effect on conspiracy theories, simultaneously helping and hurting the cause. While a world of information is at people’s fingertips, so to are alternate worlds of manufactured propaganda. While the Internet may appear to be a democratized, unfiltered path toward facts and truth, it is easily manipulated. Powerful corporations pay a lot of money to have their dirty laundry buried in the search results underneath contrived puff pieces.

With nearly the entire mainstream media apparatus at their disposal, the government is a maestro at this practice. As we learned from so-called Operation Mockingbird — a conspiracy theory fact discussed in my first post on the subject, “Conspiracy Theories That Turned Out to Be True,” — hundreds, if not thousands of news organizations have been conscripted into working with the CIA to support pro-government narratives. That was in the 1960s. One can only imagine how vast the network is now. Not to mention the fact that a single proprietary algorithm owned by Google dictates the vast majority of the population’s exposure to a subject.

In Part 1, I noted that the list had been meticulously whittled down to focus only on conspiracies that have been irrefutably proven to be fact. There are hundreds of conspiracy theories I think are likely to be true that are not on this list because there simply isn’t enough hard evidence yet to confirm it 100%. I also aimed for a good mixture of old conspiracies and new conspiracies. With groups like Wikileaks and Anonymous out there, the last decade has witnessed a dam burst of new data and documents. Thanks to intrepid journalists, whistleblowers, hacktivists, and leakers, the human race continues to tear down the wall of lies erected by the corporatocracy.

Without further ado, let’s get to it….ten more conspiracy theories we can start calling conspiracy facts.

1. Operation Ajax, the CIA’s Iranian Coup

U.S. President Harry Truman, left, and Iranian Prime Minister Mohammad Mossadegh, right, stand together on Oct. 23, 1951. The coup d'état that led to the democratically elected Mossadegh's ouster two years later was orchestrated by the U.S. CIA, declassified documents confirm. (Photo/Abbie Rowe via Wikimedia Commons)

In Iran it was called 28 Mordad coup; the United Kingdom contributed under the name Operation Boot. However you refer to it, Operation Ajax was an Iranian coup that in 1953 deposed the democratically elected Muhammad Mossadeq and reinstalled the monarchical power of Shah Mohammed Reza Pahlavi. The primary cause of the coup was Mossadeq’s attempt to nationalize the Iran’s oil fields, which threatened the oil profits of Britain’s Anglo-Persian Oil Company (AIOC). The U.S. — in addition to protecting its ally’s petroleum monopoly — viewed Mossadeq’s move as communist aggression and therefore helped plan the return to power of one the world’s more insidious dictators, the shah. Operation Ajax resulted almost directly in 1979 Iranian revolution that created an anti-West Islamic republic led by the Ayatollah Khomeini.

Though it was long considered an open secret, the U.S. government kept the truth behind Operation Ajax concealed from the American people until very recently. The CIA declassified various documents on the 60th anniversary of the coup.

Because of the recent declassification, much information relevant to this CIA-sponsored coup is now available in the CIA’s archives.

In describing Operation Ajax, the CIA itself has become rather oddly self-reflective:

“The world has paid a heavy price for the lack of democracy in most of the Middle East. Operation Ajax taught tyrants and aspiring tyrants that the world’s most powerful governments were willing to tolerate limitless oppression as long as oppressive regimes were friendly to the West and to Western oil companies. That helped tilt the political balance in a vast region away from freedom and toward dictatorship.”

In a recent interview on Democracy Now, Bernie Sanders remarked to Amy Goodman that this seminal chapter in the history of U.S./Middle East relations is almost entirely ignored by mainstream media. “Have you seen many shows about that on NBC?” he asked the crowd.

2. “Nayirah,” the False Pretext for the first Gulf War

It’s now commonly believed that the second Iraq War was sold to the American people — and their congressional representatives — based on an elaborate web of lies and manipulated intelligence. What is less commonly known is that the first Iraq War came about in a very similar fashion. While, surprisingly, there is broad agreement that “Operation Desert Storm” was a worthwhile war, many people overlook the role of a fifteen-year-old girl named “Nayirah,” whose 1990 testimony to the Congressional Human Rights Caucus is credited with cementing the idea of Iraqi war crimes in the American popular consciousness. Nayirah testified to having witnessed Iraqi troops tearing babies from their incubators in Kuwaiti hospitals and leaving them to die on the floor. It’s a profoundly disturbing image….and one that was entirely fictitious.

The Nayirah testimony was a false testimony given before the Congressional Human Rights Caucus on October 10, 1990 by a 15-year-old girl who provided only her first name, Nayirah.

After a lengthy investigation, Amnesty International and other independent watchdog groups discovered that the situation described by Nayirah was fabricated by a PR firm named Hill & Knowlton (the largest in the world at this time), which was hired by the group Citizens for a Free Kuwait in order to create propaganda that would galvanize pro-war sentiment. The man overseeing the campaign was Bush political confidante Craig Fuller. This was a massive project utilizing 119 H&K executives in 12 offices across the United States and even involved casting Nayirah, who turned out to be Nayirah al-Sabah, daughter of Saud bin Nasir Al-Sabah, Kuwaiti ambassador to the United States. The Justice Department, which could have investigated the entire effort under the Foreign Agents Registration Act, turned a blind eye, allowing the Bush administration to pull off a massive “Wag the Dog”-style ideological false flag. Others call it “atrocity propaganda,” a form of psyop (psychological operation).

The “Nayirah” story is just another example of the government falsifying a narrative in order to manipulate the public into supporting war. This kind of psychological propaganda continued all through the second Iraq War and the War on Terror. Just recently, it was revealed that the Pentagon paid PR firm Bell Pottinger $540 million to create fake terrorist videos in Iraq.

3. Operation Paperclip

Originally called Operation Overcast, Operation Paperclip was the codename of the secret American plan to conscript Nazi scientists into U.S. intelligence services at the end of World War II. This ushered in and shielded about 1,500 Germans, including some engineers and technicians. Ostensibly, the purpose of this redeployment by the Joint Intelligence Objectives Agency (JIOA) was to prevent Nazi scientific intelligence from helping reconstitute a new German government; it was also a tactic meant to ensure the Soviet Union didn’t acquire any new technology.

Whatever strategic mindset might have lived inside Operation Paperclip, at its core, the project gave American identities to some of the most ruthless war criminals the world has ever seen.

According to Ynet, the new Nazi CIA scientists helped develop chemical weapons for the U.S. and worked alongside American scientists to develop LSD, which the CIA viewed as a ‘truth serum.’

4. Operation Gladio: Anti-Communist False Flags in Italy

Operation Gladio was the post-World War II love-child of a CIA/NATO/M16 plot to battle communism in Italy. The operation lasted two decades and used CIA-created “stay behind” networks as part of a “Strategy of Tension” that coordinated multiple terrorist attacks from the late 1960s to the early 1980s. Authorities blamed these attacks on Marxists and other left-wing political opponents in order to stigmatize and condemn communism. The operation involved multiple bombings that killed hundreds of innocent people, including children. The most notable attack was the August 2, 1980, bombing of the Bologna train station, which killed 85 people.

In an Anti-Media piece written about five confirmed false flag operations (which includes Operation Gladio, I wrote:

“How do we know about Operation Gladio in spite of its incredibly clandestine nature? There are two principle sources. One, the investigations of Italian judge Felice Casson, whose presentation was so compelling it forced Italian Prime Minister Giulio Andreotti to confirm Gladio’s existence. The second source is testimony from an actual Gladio operative, Vincenzo Vinciguerra, who is serving a life sentence for murder. In a 1990 interview with the Guardian, Vincenzo stated that Gladio was designed to psychologically coerce the Italian public to rely on the state for security.”

Operation Gladio is a textbook modern “false flag.” It used terror and violence to discredit an ideology (communism). And to think, this came at a time before the internet when the CIA didn’t have a fully entrenched mainstream media to trumpet, echo, and build consensus around every little nuance (though they were working on it with COINTELPRO and Operation Mockingbird). Nowadays, the CIA has multinational propaganda machines — the news networks — to make sure all terrorist attacks fit into the carefully scripted narrative that manufactures consent around our wars for oil, natural gas, and other resources.

5. Government uses insect and rodent drones to spy

It’s somewhat of a cliche to jokingly refer to a surrounding insect or bird as a clandestine spy deployed by the government to watch you. While we lack certain specifics on the ubiquity of the technology, we know definitively that the government has the technology to surveil citizens using insects and other small animals, and they use this technology in military applications.

There is some evidence to suggest that insect drones are used domestically to spy on citizens. In 2007, this theory conspiracy theory took shape when anti-war protesters reported strange buzzing insects. Written off as tin foil material, officials dismissed the suggestion that the government used insect drones to spy. Multiple witnesses reported erratic dragonfly-type objects hovering in the sky. The very next year, the U.S. Air Force announced their intended use of insect-sized spies ‘as tiny as bumblebees’ to infiltrate buildings in order to ‘photograph, record, and even attack insurgents and terrorists.‘ The government has come clean about its use of drones to spy on American citizens, so it’s difficult to believe they wouldn’t have at least tried insect drones.

While we can’t say with 100% certainty that there are insect drones spying on American citizens, though it’s exceedingly likely, what is irrefutable is the use of micro air vehicles (MAVs) and “spy animals” as war-time tools. DARPA launched its Stealthy Insect Sensor Project in 1999 as an effort to deputize bees as bomb locators in war zones. This was just the first phase in an ongoing project. In her book The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency, journalist Annie Jacobsen revealed that the agency’s near-future trajectory is to introduce “biohybrids” — part animal, part machine cyborgs — into the United States’ military arsenal.

In an interview with Coast to Coast AM, Jacobsen said:

DARPA has already succeeded in creating a rat that will be steered by remote control by implanting an electrode in its brain.

“And it’s done the same thing with a moth which is really remarkable because the scientists implanted the electrodes in the pupa stage of the moth when it was still a worm! And then it transformed into having wings, and those tiny little micro-sensors transformed with the moth and the DARPA scientists were able to steer that moth.”

This section references information from The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency by Annie Jacobsen. Details not linked to external sources are cited in this book.

6. CIA assassinations and coups in foreign countries

When operatives for the Democratic Party claim the 2016 United States presidential election was tampered with by a foreign entity, it’s hard not to cringe at the irony. Firstly, they’ve presented no evidence, except to claim that government intelligence agencies believe it to be true. Sorry, that’s not actually evidence. That’s like the police saying they have DNA evidence but never actually scientifically presenting it in court. It’s kind of unnerving that we even have to point that out. Secondly, our own government and intelligence agencies, namely the CIA, have actively and aggressively subverted countless foreign elections over the last century and, in some cases, have outright funded the assassinations of candidates.

This subject could easily fill a multi-volume book, and countless authors have worked over the years to uncover the role of the CIA in foreign coups. Using every tool in their arsenal — including white, grey, and black psychological operations, counterinsurgencies, and brutal coups aimed at repressing and destroying radically democratic candidates — the CIA has subverted the “will of the people” across the world.

The most commonly noted instances of the CIA meddling in foreign elections and governments include the following:

This is but a small sampling of countries where even mainstream news outlets and, in many cases, the CIA itself, admits calamitous U.S. involvement. There are literally dozens more and, of course, this is restricting the conversation to soft coups — otherwise, we could certainly include the complete military decimation of Iraq, Afghanistan, Libya, and other Middle Eastern countries during the War on Terror, as well as the myriad imperial wars against perceived communist threats.

‘A foreign government hacked and subverted our election!’

The irony is thick with this one. Payback’s a bitch…..which, of course, isn’t giving our intelligence agencies, who have proven themselves to be pathological liars, the benefit of the doubt regarding their claims of Russian collusion during the 2016 presidential election. It’s just to kind of say…..you reap the harvest you have sown. When you look at the track record of the United States government, it’s a wonder the average citizen is safe traveling abroad.

7. Mainstream media is the propaganda branch of the State Department

A man takes a photo of Hillary Clinton as she walks on to the stage to accept her nomination from the Democratic Party for president on the final night, July 28, of the Democratic National Convention.

People have long accused the media of being a proxy branch of the State Department, a highly sophisticated and well-produced form of manufactured consensus and controlled opposition all rolled into one. In ostensibly democratic nations, a free and independent press is of paramount importance. But in the U.S., we find a cohesion of the state and corporate news networks that do not constitute ‘state-run media’ in the traditional sense — but it’s close.

Our first solid documentation that the media is an echo chamber for the government came with the disclosure of what has come to be called Operation Mockingbird. This nefarious and far-reaching conspiracy was documented in Part 1 and involved the CIA essentially conscripting journalists, American news agencies, and major broadcasters to become domestic propagandists and spies. Eventually, this CIA/media symbiosis included journalists from all the top news organizations. Literally, thousands of people were involved.

This infiltration of the American media and press took place during the 1950s, at the start of the Cold War, and was carried out under the auspices of fighting communism. The CIA began to restrict its use of journalists in the Operation Mockingbird program in 1976, but many people believe it has since transmogrified into something far more powerful, nefarious, and ubiquitous today. We’re still in the early stages of proving to the masses that mainstream media is little more than a mouthpiece and propaganda machine for the government and its various agencies, but the evidence is accumulating.

During the 2016 presidential election, Wikileaks exposed a number of disturbing revelations showing collusion between the media and political operatives. This included collusion between the media, the Democratic National Committee, and the Hillary Clinton campaign. But it wasn’t just about swaying the election. New revelations showed that the government actively infiltrates powerful media corporations in order to shape their content and narratives. One of the best examples of this was the State Department’s role in affecting a CBS 60 Minutes interview with Julian Assange.

Edward Snowden

@Snowden

New government doc states @60Minutes planted government questions to shape @Wikileaks interview. If true, sad to see.

View image on Twitter

A more comprehensive list of examples of the Orwellian symbiotic relationship between the press and the government can be found here.

Perhaps the most disturbing recent addition to this chapter was the “Countering Disinformation Act” that President Obama slipped into the National Defense Authorization Act (NDAA) on Christmas Eve of last year. In the context of the still-festering narrative of foreign interference in the 2016 presidential election, the act’s putative goal was to fight “fake news,” which many believe is actually a campaign to silence and dismantle alternative media on the Internet.

In order to accomplish this, the government is establishing a Global Engagement Center for managing disinformation and propaganda. Since we already know our government routinely performs psychological operations (psyops, or as they’ve been recently rebranded, Military Information Support Operations [MISO]), it should come as no surprise that manipulating the civilian population is a permanent goal. In fact, in the 2013 National Defense Authorization Act, the government formally legalized the use of psyops on U.S. citizens. So how does this Global Engagement Center factor in?

The new law states:

“The Center is authorized to provide grants or contracts of financial support to civil society groups, media content providers, nongovernmental organizations, federally funded research and development centers, private companies, or academic institutions for the following purposes:

To support local independent media who are best placed to refute foreign disinformation and manipulation in their own communities.

To collect and store examples in print, online, and social media, disinformation, misinformation, and propaganda directed at the United States and its allies and partners.

To analyze and report on tactics, techniques, and procedures of foreign information warfare with respect to disinformation, misinformation, and propaganda.

To support efforts by the Center to counter efforts by foreign entities to use disinformation, misinformation, and propaganda to influence the policies and social and political stability of the United States and United States allies and partner nations.”

While it may not immediately strike one as sinister, this codification of repressing journalists and voices the government deems to be disinformation while creating an even more centralized infrastructure to control “fact-based narratives” in the media should be highly alarming to anyone who cares about a free press. It would seem that while the State already has a steel grip on corporate news networks, they are struggling to control the influence of online independent media. This new law may be the start of this century’s Operation Mockingbird — a new full-scale infiltration of the local news and a war against anti-establishment narratives on the Internet. This is already taking the form of algorithmic censorship through Facebook and Google, as well as a weaponization of the “fake news” narrative.

8. The Deep State (or the conspiracy theory formerly known as The New World Order)

I describe the Deep State in depth in an article entitled “Forget the New World Order — Here’s Who Really Runs the World.” In it I wrote:

“For decades, extreme ideologies on both the left and the right have clashed over the conspiratorial concept of a shadowy secret government often called the New World Order pulling the strings on the world’s heads of state and captains of industry.

“The phrase New World Order is largely derided as a sophomoric conspiracy theory entertained by minds that lack the sophistication necessary to understand the nuances of geopolitics. But it turns out the core idea — one of deep and overarching collusion between Wall Street and government with a globalist agenda — is operational in what a number of insiders call the “Deep State.”

In the wake of the 2016 election, the concept of the Deep State has grown into somewhat of a common phrase in the lexicon of alternative media theorists, crossing political boundaries and resonating across the ideological spectrum. Everyone from alt-left socialists to alt-righters now agrees there is an unelected cabal of elite neo-conservative corporatists and crony lawmakers running the geopolitical show.

Because it’s such a complex subject and permeates so many different academic, economic, and state apparatuses, it’s virtually impossible to issue a single, simple definition of the Deep State. If I were to hazard one, I would call it “the nexus of Wall Street and the national security state — a relationship where elected and unelected figures join forces to consolidate power and serve vested interests.” But even that is vague. We could also call it “the failure of our visible constitutional government and the cross-fertilization of corporatism with the globalist war on terror.”

Former Republican congressional aide Mike Lofgren gets more specific with who is involved:

“It is a hybrid of national security and law enforcement agencies: the Department of Defense, the Department of State, the Department of Homeland Security, the Central Intelligence Agency and the Justice Department. I also include the Department of the Treasury because of its jurisdiction over financial flows, its enforcement of international sanctions and its organic symbiosis with Wall Street.”

In his writing, Lofgren emphasized the role of FISA international surveillance courts. This was confirmed in a very interesting way when President Donald Trump accused former President Obama of tapping his phones, a charge Obama aides deflected by saying that if such a warrant had been issued, it would have been done through a FISA court. This shows how presidents are able to skirt the constitution by outsourcing surveillance requests. It also shows the interconnectedness of these agencies.

However you want to describe it, it’s the natural conclusion of Operation Mockingbird and most certainly a reality that the elites would have rather kept under the radar. Fortunately for the people of the Earth, revelations from Wikileaks and other whistleblowers have, over the last couple decades, made it abundantly clear that the Deep State (the New World Order) not only exists, but also that it’s far more sinister and powerful than early conspiracy theorists could have ever imagined.

9. CIA used psychics to infiltrate the Soviet Union during Cold War

It’s a plot in a science fiction movie or TV show we’ve all seen: a psychic being leveraged by a law enforcement agency to track down a criminal. The concept of a government psychic program was popularized by the film The Men Who Stare at Goats, which lampooned the mythical STARGATE program supposedly run by the CIA. Most people scoffed at the reality of this and considered it a wacky conspiracy theory, but a recently declassified trove of hundreds of thousands of CIA files finally confirmed not only that psychics are regularly used by police and other law enforcement agencies, but also that the government actually weaponized psychics during the Cold War to try to infiltrate the Soviet Union and gain information.

The documents, made publicly available thanks to the activist group Muckrock, confirm there were top-secret CIA and Defense Department programs to use remote viewing to infiltrate Soviet military installments. There were also programs developing ways to engage in “psychic warfare,” including the development of a “psychic shield” to block Soviet psychics.

10. CIA monitors U.S. citizens via their smart devices

James Clapper, John Brennan, James Comey, Michael Flynn,

Early in 2017, the organization Wikileaks began releasing their first post-2016 election cables with a series of explosive data dumps regarding the CIA’s cyber hacking abilities and exploits. It is called Vault 7. Updated serially in “Year Zero,” “Dark Matter,” “Marble,” “Grasshopper,” “HIVE,” “Weeping Angel,” and “Scribbles,” the documents show the unprecedented collection of cyber vulnerabilities, exploits, and hacking abilities consolidated within the agency that many believe constitute wide-ranging breaches of civil liberties.

Chief among these breaches is domestic surveillance and extrajudicial cyberhacking, which the Wikileaks documents confirm are taking place in an abundance of forms. The Vault 7 documents confirm that: The CIA can break into Android and iPhone handsets and all kinds of computers; the agency has the ability to hack into Apple iPhones and Android smartphones and actually assume full remote control of the device; the CIA can access consumer smart TVs to listen in on surrounding conversations; the agency looked into ways to hack into cars and crash them, allowing ‘nearly undetectable assassinations’ (an assertion that may be relevant to the Michael Hastings case); the CIA concealed vulnerabilities that could be exploited by hackers from other countries or governments.

This is just the beginning. Early in the release, Julian Assange said the documents released represented only a tiny fraction of the total data that was forthcoming. Wikileaks’ episodic data dumps on the CIA’s cyber hacking programs are nothing less than stunning. The establishment’s reaction to the ongoing releases verifies how big of a deal they are. One congressman went so far as to refer to Julian Assange and his whistleblowing outfit as a “foreign terrorist organization.” This isn’t new or unexpected, as the group’s slow but inexorable drips of revelations about government malfeasance continue to confound and disturb private citizens, consumer rights activists, tech companies, and international leaders alike.

Reality Check

Of course, not all conspiracy theories are true. In fact, there are hundreds, even thousands, that have been roundly debunked. Unfortunately, there are those who seek to lie and invent fictions for monetary gain and fame. Misinformation, propaganda, and dishonesty exist at all levels of society.

However, sometimes conspiracy theories turn out to be true. Therefore, it’s worth assessing them, even if their claims appear wholly outlandish. Especially if their claims appear wholly outlandish.

The conspiracy theory is a tool in a larger toolkit used by those who wish to decode the grossly imperfect and fluid narrative describing our world. When investigated responsibly, conspiracy theories function as part of a conceptual spectrum of analysis with which we can investigate government and corporate abuses of power and the manufacturing of ‘consensus reality.’ In the 21st century, when the very transmission of information can be considered criminal, being a responsible conspiracy theorist just means you practice due diligence and hunger for the truth.

Source: Mint Press News

With the latest WikiLeaks revelations about the CIA – is privacy really dead? | The Guardian

ComeyBy Olivia Solon

Comey, has said that Americans should not have expectations of “absolute privacy”.

“There is no such thing as absolute privacy in America: there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. The remark came as he was discussing the rise of encryption since Edward Snowden’s 2013 revelations of the NSA’s mass surveillance tools, used on citizens around the world.

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.

So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Not according to the Electronic Frontier Foundation’s executive director, Cindy Cohn.

“The freedom to have a private conversation – free from the worry that a hostile government, a rogue government agent or a competitor or a criminal are listening – is central to a free society,” she said.

While not as strict as privacy laws in Europe, the fourth amendment to the US constitution does guarantee the right to be free from unreasonable searches and seizures.

That doesn’t mean citizens have “absolute privacy”.

“I don’t think there’s been absolute privacy in the history of mankind,” said Albert Gidari, director of privacy at the Stanford Center for Internet and Society. “You walk out in public and it’s no longer private. You shout from one window to another and someone will hear you in conversation.”

“At the same time things are more intrusive, persistent, searchable, they never die. So our conception of what is or isn’t risk from a privacy perspective does change and evolve over time.”

The law hasn’t kept pace with digital technologies. For example, there is a legal theory called the “third-party doctrine” that holds that people who give up their information to third parties like banks, phone companies, social networks and ISPs have “no reasonable expectation of privacy”. This has allowed the US government to obtain information without legal warrants.

Unlike the NSA techniques revealed by Snowden, the CIA appears to favour a more targeted approach: less dragnet, more spearfishing.

The WikiLeaks files show that the CIA has assembled a formidable arsenal of cyberweapons designed to target individuals’ devices such as mobile phones, laptops and TVs by targeting the operating systems such as Android, iOS and Windows with malware.

It’s encouraging to note that the government has yet to crack the encryption of secure messaging apps such as WhatsApp, Signal and Confide. However, it does not need to if it can instal malware on people’s devices that can collect audio and message traffic before encryption is applied.

Gidari isn’t that surprised. “It confirms what everyone saw in last week’s episode of 24. People expect these tools to exist,” he said, adding that people were more surprised that the FBI was initially incapable of breaking into the San Bernardino killer’s iPhone.

“People expect the government to have these magic tools,” he said.

American citizens should not be lulled into a false sense of security that the CIA only targets foreign nationals. The “Vault 7” documents show a broad exchange of tools and information between the CIA, the National Security Agency, and other US federal agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.

“We can’t spy on our own citizens but we can spy on anyone else’s,” explained Neil Richards, a law professor from Washington University. “If agencies are friends with each other, they have everybody else do their work for them and they just share the data.”

“Dividing the world into American citizens and non-American citizens is a false dichotomy,” Gidari added. “We don’t have a monopoly on spy tools.”

This leaves us with a terrifying new prospect: government spies essentially deploying viruses and trojans against their own citizens.

The onus is now on the companies that make the devices to plug any holes in their operating systems – something they do regularly through bug bounty programs, where security researchers disclose vulnerabilities in return for rewards.

It’s clear from the CIA files that the US government has flouted this custom in order to stockpile “zero days” – undisclosed exploits – for its own advantage. This is a practice the US government has previously publicly denied.

“If companies aren’t aware that a vulnerability exists they can’t patch it. If it exists it can be exploited by any malicious actor – whether that’s a hacker, foreign state or criminal enterprise,” said Neema Singh Guliani, legislative counsel with the American Civil Liberties Union.

“I have a big problem with the government leaving us vulnerable to the same tools in hand so other nation states and hackers could exploit them,” Gidari said. “That isn’t protecting American citizens.”

Gidari’s view echoes Apple’s stance when the FBI demanded the company build a backdoor to the iPhone so they could access data on the San Bernardino killer’s phone.

“Apple believes deeply that people in the United States and around the world deserve data protection, security and privacy. Sacrificing one for the other only puts people and countries at greater risk,” the company said at the time. The iPhone maker was more muted in its response to the Vault 7 dump, vowing to “rapidly address” any security holes.

“There is nearly universal consensus from technologists that it’s impossible to build weaknesses or access mechanisms into technology that can only be used by the good guys and not the bad,” Cohn said.

This week’s revelations are sure to increase the strain on relations between Silicon Valley and the US government. While some of the older telephony companies such as AT&T and Verizon, which rely heavily on government contracts, have a history of compliance with government requests, tech giants Google, Facebook, Microsoft and Apple have proved to be less compliant.

It’s not possible to meaningfully participate in modern life without relationships with some or all of these technology companies processing our data, Richards added. So it’s important to know where their loyalties lie – to their customers or to government.

Since Snowden’s revelations of mass surveillance, companies such as Apple, Google and Microsoft have been working hard to rebuild trust with consumers through strengthening security, fighting government data requests and releasing transparency reports highlighting when and how many requests are made.

“It’s a very encouraging development if we care about civil liberties and the right to privacy, but at the same time it’s unsatisfying if the discretion of a company is the only real protection for our data,” Richards said.

“We need to build the digital society we want rather than the one handed to us by default,” he added.

This will require a complete overhaul of the laws relating to when the government can collect location and content information, something civil liberty campaigners have been pushing for.

“These decisions need to be made by the public, not by law enforcement or tech executives sitting in private,” Richards said.

Source:  The Guardian

Assange released 500,000 diplomatic cables which reveals how the CIA created ISIS | AWD News

assange

The founder of the transparency organization WikiLeaks released a statement on 1 December upon the release of over 500,000 diplomatic cables dating back to 1979, which succinctly reveals how the CIA was essentially responsible for creating the Islamic State (ISIS) terror group.

The timing of the release coincided with the sixth anniversary of WikiLeaks “Cablegate” release, which exposed the machinations of the underbelly of the U.S. empire. The latest release, known as the “Carter Cables,” adds 531,525 new diplomatic cables to the WikiLeaks’ already voluminous Public Library of U.S. Diplomacy (PLUSD).

In a statement released in concert with the release of the “Carter Cables,” Julian Assange mapped out how the events of 1979 began a series of events that have ultimately culminated in the rise of ISIS.

“If any year could be said to be the “year zero” of our modern era, 1979 is it,” said Assange.

Assange lays bare the reality that the roots of modern Islamist terrorism began through a joint venture by the CIA and Saudi Arabian government, to the tune of billions of dollars, to create a “Mujahideen” force to fight against the Soviet Union in Afghanistan – which ultimately led to the creation of al-Qaeda.

Assange is not alone in his claims either. According to a poll by the Express, the overwhelming majority of people understand that US foreign policy created ISIS.
Assange goes on to note that the subsequent attacks of 9/11, and invasion of Afghanistan and Iraq, directly led to the rise of ISIS.

“In the Middle East, the Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world.
“The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan,” said Assange.

The narrative laid out by Assange exposes exactly how militant Islam was nurtured by the CIA and Saudi government as a mean of usurping the communist Afghani government, which had asked for Soviet assistance in combatting Islamic terrorism.

“The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union.

“The 1979 current of Islamification spread to Pakistan where the US embassy was burned to the ground and Pakistan Prime Minister Zulfikar Ali Bhutto was executed.
“The Iranian hostage crisis would go on to fatally undermine Jimmy Carter’s presidency and see the election of Ronald Reagan.

“The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS,” said Assange.

In addition to the rise of global militant Islam, the latest release also includes cables regarding the election of Margaret Thatcher as British Prime Minister. Three Mile Island nuclear incident is also covered as well as cables highlighting Henry Kissinger secretly working with David Rockefeller to find a place for the deposed Shah of Iran to hide.

“In 1979 it seemed as if the blood would never stop,” noted Assange. “Dozens of countries saw assassinations, coups, revolts, bombings, political kidnappings and wars of liberation.”

With the release of the “Carter Cables,” WikiLeaks’ has now published a total of 3.3 million U.S. diplomatic cables. Staying true to their motto – WikiLeaks continues to open up governments.

Below is a video interview with Assange where he highlights an email from the Podesta leak, which exposed that the governments of Saudi Arabia and Qatar are directly funding ISIS. In that email, sent on August 17, 2014, Hillary Clinton asked John Podesta to help put “pressure” on the Qatari and Saudi Arabian governments over their support of ISIS. State sponsorship of ISIS, by what is generally considered a close ally of the United States, is something that U.S. officials continue to refuse to acknowledge publicly.

Hillary Clinton’s email to Podesta reveals clearly the reality of the situation.
“We need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region,” Clinton wrote in the email.

Source: Wikileaks

Inside The Invisible Government: John Pilger On War, Propaganda, Clinton And Trump | New Matilda

overiraq

By John Pilger

A silent war continues, led by the west, ignored by the media, writes John Pilger.

The American journalist, Edward Bernays, is often described as the man who invented modern propaganda.

The nephew of Sigmund Freud, the pioneer of psycho-analysis, it was Bernays who coined the term “public relations” as a euphemism for spin and its deceptions.

In 1929, he persuaded feminists to promote cigarettes for women by smoking in the New York Easter Parade – behaviour then considered outlandish. One feminist, Ruth Booth, declared, “Women! Light another torch of freedom! Fight another sex taboo!”

Bernays’ influence extended far beyond advertising. His greatest success was his role in convincing the American public to join the slaughter of the First World War. The secret, he said, was “engineering the consent” of people in order to “control and regiment [them]according to our will without their knowing about it”.

He described this as “the true ruling power in our society” and called it an “invisible government”.

Today, the invisible government has never been more powerful and less understood. In my career as a journalist and film-maker, I have never known propaganda to insinuate our lives as it does now, and to go unchallenged.

Imagine two cities. Both are under siege by the forces of the government of that country. Both cities are occupied by fanatics, who commit terrible atrocities, such as beheading people.

But there is a vital difference. In one siege, the government soldiers are described as liberators by Western reporters embedded with them, who enthusiastically report their battles and air strikes. There are front page pictures of these heroic soldiers giving a V-sign for victory. There is scant mention of civilian casualties.

(IMAGE: The U.S. Army, Flickr)
(IMAGE: The U.S. Army, Flickr)

In the second city – in another country nearby – almost exactly the same thing is happening. Government forces are laying siege to a city controlled by the same breed of fanatics.

The difference is that these fanatics are supported, supplied and armed by “us” – by the United States and Britain. They even have a media centre that is funded by Britain and America.

Another difference is that the government soldiers laying siege to this city are the bad guys, condemned for assaulting and bombing the city – which is exactly what the good soldiers do in the first city.

Confusing? Not really. Such is the basic double standard that is the essence of propaganda. I am referring, of course, to the current siege of the city of Mosul by the government forces of Iraq, who are backed by the United States and Britain, and to the siege of Aleppo by the government forces of Syria, backed by Russia. One is good; the other is bad.

What is seldom reported is that both cities would not be occupied by fanatics and ravaged by war if Britain and the United States had not invaded Iraq in 2003. That criminal enterprise was launched on lies strikingly similar to the propaganda that now distorts our understanding of the civil war in Syria.

Without this drumbeat of propaganda dressed up as news, the monstrous ISIS and Al-Qaida and al-Nusra and the rest of the jihadist gang might not exist, and the people of Syria might not be fighting for their lives today.

Some may remember in 2003 a succession of BBC reporters turning to the camera and telling us that Blair was “vindicated” for what turned out to be the crime of the century. The US television networks produced the same validation for George W. Bush. Fox News brought on Henry Kissinger to effuse over Colin Powell’s fabrications.

Former US president George W Bush (IMAGE: Peter Stevens, Flickr).
Former US president George W Bush (IMAGE: Peter Stevens, Flickr).

The same year, soon after the invasion, I filmed an interview in Washington with Charles Lewis, the renowned American investigative journalist. I asked him, “What would have happened if the freest media in the world had seriously challenged what turned out to be crude propaganda?”

He replied that if journalists had done their job, “there is a very, very good chance we would not have gone to war in Iraq”.

It was a shocking statement, and one supported by other famous journalists to whom I put the same question – Dan Rather of CBS, David Rose of the Observer and journalists and producers in the BBC, who wished to remain anonymous.

In other words, had journalists done their job, had they challenged and investigated the propaganda instead of amplifying it, hundreds of thousands of men, women and children would be alive today, and there would be no ISIS and no siege of Aleppo or Mosul.

There would have been no atrocity on the London Underground on 7th July 2005. There would have been no flight of millions of refugees; there would be no miserable camps.

When the terrorist atrocity happened in Paris last November, President Francoise Hollande immediately sent planes to bomb Syria – and more terrorism followed, predictably, the product of Hollande’s bombast about France being “at war” and “showing no mercy”. That state violence and jihadist violence feed off each other is the truth that no national leader has the courage to speak.

“When the truth is replaced by silence,” said the Soviet dissident Yevtushenko, “the silence is a lie.”

The attack on Iraq, the attack on Libya, the attack on Syria happened because the leader in each of these countries was not a puppet of the West. The human rights record of a Saddam or a Gaddafi was irrelevant. They did not obey orders and surrender control of their country.

The same fate awaited Slobodan Milosevic once he had refused to sign an “agreement” that demanded the occupation of Serbia and its conversion to a market economy. His people were bombed, and he was prosecuted in The Hague. Independence of this kind is intolerable.

Syria-Assad

As WikiLeaks has revealed, it was only when the Syrian leader Bashar al-Assad in 2009 rejected an oil pipeline, running through his country from Qatar to Europe, that he was attacked.

From that moment, the CIA planned to destroy the government of Syria with jihadist fanatics – the same fanatics currently holding the people of Mosul and eastern Aleppo hostage.

Why is this not news? The former British Foreign Office official Carne Ross, who was responsible for operating sanctions against Iraq, told me: “We would feed journalists factoids of sanitised intelligence, or we would freeze them out. That is how it worked.”

The West’s medieval client, Saudi Arabia – to which the US and Britain sell billions of dollars’ worth of arms – is at present destroying Yemen, a country so poor that in the best of times, half the children are malnourished.

Look on YouTube and you will see the kind of massive bombs – “our” bombs – that the Saudis use against dirt-poor villages, and against weddings, and funerals.

The explosions look like small atomic bombs. The bomb aimers in Saudi Arabia work side-by-side with British officers. This fact is not on the evening news.

Propaganda is most effective when our consent is engineered by those with a fine education – Oxford, Cambridge, Harvard, Columbia – and with careers on the BBC, theGuardian, the New York Times, the Washington Post.

These organisations are known as the liberal media. They present themselves as enlightened, progressive tribunes of the moral zeitgeist. They are anti-racist, pro-feminist and pro-LGBT.

And they love war.

While they speak up for feminism, they support rapacious wars that deny the rights of countless women, including the right to life.

In 2011, Libya, then a modern state, was destroyed on the pretext that Muammar Gaddafi was about to commit genocide on his own people. That was the incessant news; and there was no evidence. It was a lie.

An anti-Gaddafi rally, Libya 2011. (IMAGE: mojomogwai, Flickr)
An anti-Gaddafi rally, Libya 2011. (IMAGE: mojomogwai, Flickr)

In fact, Britain, Europe and the United States wanted what they like to call “regime change” in Libya, the biggest oil producer in Africa. Gaddafi’s influence in the continent and, above all, his independence were intolerable.

So he was murdered with a knife in his rear by fanatics, backed by America, Britain and France. Hillary Clinton cheered his gruesome death for the camera, declaring,

“We came, we saw, he died!”

The destruction of Libya was a media triumph. As the war drums were beaten, Jonathan Freedland wrote in the Guardian: “Though the risks are very real, the case for intervention remains strong.”

Intervention – what a polite, benign, Guardian word, whose real meaning, for Libya, was death and destruction.

According to its own records, Nato launched 9,700 “strike sorties” against Libya, of which more than a third were aimed at civilian targets. They included missiles with uranium warheads. Look at the photographs of the rubble of Misurata and Sirte, and the mass graves identified by the Red Cross. The Unicef report on the children killed says, “most [of them]under the age of 10”.

As a direct consequence, Sirte became the capital of ISIS.

Ukraine is another media triumph. Respectable liberal newspapers such as the New York Times, the Washington Post and the Guardian, and mainstream broadcasters such as the BBC, NBC, CBS, CNN have played a critical role in conditioning their viewers to accept a new and dangerous cold war.

All have misrepresented events in Ukraine as a malign act by Russia when, in fact, the coup in Ukraine in 2014 was the work of the United States, aided by Germany and Nato.

This inversion of reality is so pervasive that Washington’s military intimidation of Russia is not news; it is suppressed behind a smear and scare campaign of the kind I grew up with during the first cold war. Once again, the Ruskies are coming to get us, led by another Stalin, whom The Economist depicts as the devil.

The suppression of the truth about Ukraine is one of the most complete news blackouts I can remember. The fascists who engineered the coup in Kiev are the same breed that backed the Nazi invasion of the Soviet Union in 1941. Of all the scares about the rise of fascist anti-Semitism in Europe, no leader ever mentions the fascists in Ukraine – except Vladimir Putin, but he does not count.

Russian president Vladimir Putin. (IMAGE: IoSonoUnaFotoCamera, Flickr).
Russian president Vladimir Putin. (IMAGE: IoSonoUnaFotoCamera, Flickr).

Many in the Western media have worked hard to present the ethnic Russian-speaking population of Ukraine as outsiders in their own country, as agents of Moscow, almost never as Ukrainians seeking a federation within Ukraine and as Ukrainian citizens resisting a foreign-orchestrated coup against their elected government.

There is almost the joie d’esprit of a class reunion of warmongers. The drum-beaters of the Washington Post inciting war with Russia are the very same editorial writers who published the lie that Saddam Hussein had weapons of mass destruction.

To most of us, the American presidential campaign is a media freak show, in which Donald Trump is the arch villain.

But Trump is loathed by those with power in the United States for reasons that have little to do with his obnoxious behaviour and opinions. To the invisible government in Washington, the unpredictable Trump is an obstacle to America’s design for the 21stcentury.

This is to maintain the dominance of the United States and to subjugate Russia, and, if possible, China.

To the militarists in Washington, the real problem with Trump is that, in his lucid moments, he seems not to want a war with Russia; he wants to talk with the Russian president, not fight him; he says he wants to talk with the president of China.

In the first debate with Hillary Clinton, Trump promised not to be the first to introduce nuclear weapons into a conflict. He said, “I would certainly not do first strike. Once the nuclear alternative happens, it’s over.” That was not news.

Did he really mean it? Who knows? He often contradicts himself. But what is clear is that Trump is considered a serious threat to the status quo maintained by the vast national security machine that runs the United States, regardless of who is in the White House.

The CIA wants him beaten. The Pentagon wants him beaten. The media wants him beaten. Even his own party wants him beaten. He is a threat to the rulers of the world – unlike Clinton who has left no doubt she is prepared to go to war with nuclear-armed Russia and China.

US Republican presidential candidate, Donald Trump. (IMAGE: Gage Skidmore, Flickr)
US Republican presidential candidate, Donald Trump. (IMAGE: Gage Skidmore, Flickr)

Clinton has the form, as she often boasts. Indeed, her record is proven. As a senator, she backed the bloodbath in Iraq. When she ran against Obama in 2008, she threatened to “totally obliterate” Iran. As Secretary of State, she colluded in the destruction of governments in Libya and Honduras and set in train the baiting of China.

She has now pledged to support a No Fly Zone in Syria — a direct provocation for war with Russia. Clinton may well become the most dangerous president of the United States in my lifetime –a distinction for which the competition is fierce.

Without a shred of evidence, she has accused Russia of supporting Trump and hacking her emails. Released by WikiLeaks, these emails tell us that what Clinton says in private, in speeches to the rich and powerful, is the opposite of what she says in public.

That is why silencing and threatening Julian Assange is so important. As the editor of WikiLeaks, Assange knows the truth. And let me assure those who are concerned, he is well, and WikiLeaks is operating on all cylinders.

Today, the greatest build-up of American-led forces since World War Two is under way – in the Caucasus and eastern Europe, on the border with Russia, and in Asia and the Pacific, where China is the target.

Keep that in mind when the presidential election circus reaches its finale on November 8th, If the winner is Clinton, a Greek chorus of witless commentators will celebrate her coronation as a great step forward for women. None will mention Clinton’s victims: the women of Syria, the women of Iraq, the women of Libya. None will mention the civil defence drills being conducted in Russia. None will recall Edward Bernays’ “torches of freedom”.

Democratic presidential candidate, Hillary Clinton. (IMAGE: iprimages, Flickr)
Democratic presidential candidate, Hillary Clinton. (IMAGE: iprimages, Flickr)

George Bush’s press spokesman once called the media “complicit enablers”.

Coming from a senior official in an administration whose lies, enabled by the media, caused such suffering, that description is a warning from history.

In 1946, the Nuremberg Tribunal prosecutor said of the German media: “Before every major aggression, they initiated a press campaign calculated to weaken their victims and to prepare the German people psychologically for the attack. In the propaganda system, it was the daily press and the radio that were the most important weapons.”

Source: New Matilda