VIDEO — Google “Machine Learning Fairness” Whistleblower Goes Public, says: “burden lifted off of my soul”
via Project Veritas
Aug 14, 2019
A Google insider who anonymously leaked internal documents to Project Veritas made the decision to go public in an on-the-record video interview. The insider, Zachary Vorhies, decided to go public after receiving a letter from Google, and after he says Google allegedly called the police to perform a “wellness check” on him.
See the documents Zach leaked to Project Veritas in June: https://youtu.be/csP4z8dR6X0
[UPDATE: Red Pill News – Whistleblower Zach Vorhies Revealed Part 1 & Part 2 (Sept. 1st, 2019)]
[related: Gematria & Tarot reflect Zachary Vorhies’ whistleblowing]
Jade Helm: The Psy Op
by Jay Dyer
via 21st Century Wire
May 29, 2015
For most consumers of alternative news and media, the lineup of the players constitutes the tyrants and their systemic control, and the enlightened underground, with both sides fighting the great battle of winning the hearts and minds of the rest of the public.
For the alternative news and information community, the possibility of large-scale psychological operations within alternative media itself are generally outside the spectrum of the possible.
Indeed, crowds today are sill cheering on Assange and his Vaudeville Whistleblower Roadshow with Bradley-Chelsea Manning, and more recently, finding themselves intellectually snowed-in by our last hero, Snowden.
Enter Jade Helm…

Art by David Dees.
Jade Helm 15
In 2015, the focal point has become the Jade Helm 15 training operation across at least 7 states, with SOCOM running the training exercise for realistic military training. The brief document lists role-playing involving Texas and Utah as “hostile” areas, with insurgents in Southern California and other states like Colorado, California and Nevada as “friendly.”
On the surface, the exercise gives credence to the ultimate fears and paranoia of tea party and militia groups – clearly the U.S. government is prepping for everything from “martial law,” to “economic collapse,” and everything else under the sun that can be gleaned from a Google search and baseless YouTube speculation.
Fending off the mainstream media’s dishonest portrayal of the patriot and alternative media’s fears, Alex Newman of The New American concludes:
“Of course, critics of Jade Helm and the Obama administration should stick to facts that can be proven, rather than speculation. Most have done that, including many of those being dishonestly smeared by the deceitful media. However, the establishment press has an even more serious responsibility and duty to do the same — stick to the facts, do not deceive readers, question those in power, and adhere to basic journalistic ethics. Instead of sticking to the facts and being honest, though, establishment propagandists masquerading as journalists have once again shown the world why they cannot be trusted. As such, it is no surprise that so few Americans trust the “mainstream” press and are flocking to the alternative media by the millions.”
‘Common Sense Show’ host Dave Hodges has argued the end goal of Jade Helm is the imminent roundup, gulag confinement and gun confiscation of all Americans who have been marked as rebellious, with bank account confiscations, martial law and false flags just around the corner. Infowars reporters Joe Biggs and David Knight have argued similarly that the threats are rather constant, slow build ups to condition the American public into the acceptance of moving towards a third world, ‘banana republic’ scenario. However, what all these portrayals have not delved into is the possibility that Jade Helm 15’s sensational “leak” (a Powerpoint slide show) to the “alternative news and patriot community” itself may be nothing more than a psychological warfare operation.
In order to understand this possibility, it is necessary to understand the purpose and goal of PsyOps.
[…CONTINUE READING THIS ARTICLE and watch the included video]
VIDEO — Geoengineering Whistleblower ~ Ex-Military ~ Kristen Meghan, Hauppauge, NY, January 18th, 2014
DianeDi
Jan 27, 2014
NOTE: Please be patient as Kristen has received an overwhelming number of emails for lab requests and will answer them all as soon as possible.
Kristen Meghan, Ex-Military, former Air Force Sr. Industrial Hygienist/Environmental Specialist. Her job was Air Force Specialty Code (AFSC) was 4BOX1, Bio-environmental Engineer.
Kristen gave a ground breaking presentation of what she had discovered about Geoengineering / Chemtrails while serving her Country.
This BRAVE young lady has put her livelihood / life on the line for us.
VIDEO — Magnus Olsson: Transhumanist Agenda are mind stealers! Conference to feature NSA whistleblower
Alfred Lambremont Webre
Oct 9, 2014
Magnus Olsson: Transhumanist Agenda are mind-stealers! Brussels conference to feature NSA whistleblower William Binney
http://exopolitics.blogs.com/peaceins…
PODCAST — Red Ice Radio – Jon Rappoport – CDC Fraud: Vaccine Autism Link & Ebola
Red Ice Radio
Sept 26, 2014
Jon Rappoport is an investigative journalist, author and publisher of the website nomorefakenews.com. He has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. He returns to give a complete run down on the recent CDC scandal. On August 25, 2014 the CDC published a press release defending its 2004 study on autism. Two days later CDC whistleblower publicly admits he and his co-authors cooked that study and committed fraud. The CDC was referring to the 2004 study whistleblower William Thompson co-authored, the study he admitted was fraudulent, the study he and his co-authors slanted to bury the connection between the MMR vaccine and autism. Jon discusses the complexities behind this huge cover-up. Actor, Rob Schneider also said he has a copy of “the original CDC report that was later suppressed and fraudulently changed.” Later, Jon talks about the striking similarity between the Thompson and Snowden stories. In this extended interview, we’ll continue discussing the vaccine as well as the length the CDC and government will go to obscure damage they’ve created. We’ll move on to talk about the Ebola epidemic. We’ll hear how the CDC is getting their numbers on cases and how it is being diagnosed. The CDC claims that there will be “1 million Ebola cases by January.” As Ebola victims fly into Western nations, Jon discusses what possible scenarios are being planned in the near future in Western nations.

VIDEO — Ted L Gunderson Ex FBI Whistleblower Poisoned? – Dr.Ed Lucidi
AirCrap.org
Sept 29, 2014
Uploaded on Dec 3, 2011
Former head of FBI Los Angeles, Memphis, Dallas, poisoned with Arsenic says Dr Ed Lucidi who saw the body and treated Mr Gunderson who suffered bladder cancer and died as a result of its spread. Reportedly Mr Gunderson had a very large FBI dossier being a whistleblower against the agency and left out of moral considerations. He spoke to many around the country about his first hand information..
PODCAST/VIDEO — Interview 798 – What is Greenwald Covering Up? – BFPRoundtable #02
The Corbett Report
Dec 20, 2013
Podcast: Play in new window | Download | Embed
In this blockbuster no-holds-barred conversation, Sibel Edmonds, Guillermo Jimenez and James Corbett discuss Edmonds’ recent series of articles on Glenn Greenwald and his connection to billionaire Pierre Omidyar. We talk about the NSA/PayPal connection and Greenwald’s refusal to discuss this issue, and Edmonds reveals specific examples of publicly documented cases that Greenwald has been covering up for years.
NSA Whistleblower: Snowden Never Had Access to the “Juiciest” Intelligence Documents
Global Research
June 9, 2014
Washington’s Blog 7 June 2014

NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping.
Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
He says the NSA started spying on President Obama when he was a candidate for Senate:
Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this.
Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
RUSSELL TICE: We now know that NSA was wiretapping [Senator] Frank Church and another Senator. [That has been confirmed.]
And that got out by accident. All the information the NSA had back then – and probably many other senators and important people too, back in the 70s – they shredded and they destroyed all of that evidence. As much as they could find, they destroyed it all. By accident, something popped up 40 years later.
And, in fact, they were asked 40 years ago whether NSA had bugged Congress. And, of course, they lied. They lied through their teeth.
NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance
WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent. [Background here, here and here.]
Does Snowden even have documents which contain the information which you’ve seen?
RUSSELL TICE: The answer is no.
WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
RUSSELL TICE: Think of it this way. Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden?
Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing?
They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA. They made the reports look like they were Humint (human intelligence) reports. They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago. [The NSA and other agencies are still doing “parallel construction”, “laundering” information to hide the fact that the information is actually from mass NSA surveillance.]
Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level. It’s called “ECI” – Exceptionally Controlled Information – and it’s called the black program … which I was a specialist in, by the way.
I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations It’s highly unlikely Mr. Snowden had any access to these.
Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it. It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System. The JWICS system is what everybody at NSA has access to. Mr Snowden had Sys Admin [systems administrator] authority for the JWICS.
And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information – also known as “code word” – clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance].
ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks.
These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them. [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency.
When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times – that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up.
There was no such thing beforehand. It was made up … to try to placate the American people.
The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of.
So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
Snowden’s Failure To Understand the Most Important Documents
RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG.
The stuff that I saw looked like a bunch of alphanumeric gobbledygook. Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst. So he would see something like that, and he wouldn’t know what he’s looking at.
But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there.
I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
Cheney Was Running the Show
WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive].
Is that right … and if so, how do you know that?
RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington.
WASHINGTON’S BLOG: It sounds like it wasn’t going through normal routes? It’s not like Cheney or Addington made formal requests to the NSA … through normal means?
RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
NSA Is Spying On CONTENT as Well as Metadata
WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata?
RUSSELL TICE: Of course it is. Of course. [Background. But see this.]
NSA Spying On Journalists, Congress, Admirals, Lawyers …
RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such.
I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state.
Or an Admiral and his wife, and his kids and his staffers …
The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else.
These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
Snowden and Greenwald’s Whistleblowing Was Done In the Right Way
RUSSELL TICE: If Mr. Snowden would have had access to VRK, ECI, SAP, STO (and a few others that I will not mention here), and he released them en masse to the press, I would volunteer to shoot him as a traitor myself.
But this is not what he did.
He gave up JWICS info that he insisted be vetted for sources and methods, and true damage to national security. Mr. Greenwald and company should be congratulated on the restraint that they have shown with the JWICS documentation that they have in hand via Mr. Snowden.
Postscript: When Tice started blowing the whistle on NSA mass surveillance in the early 2000s, the NSA all of a sudden decided that Tice was “crazy”. As Tice told us:
For many years, I was the only NSA whistleblower in public.
And what they did is call me in – 9 months after my routine psychological evaluation – which I passed with flying colors, like every other one I’ve had in my entire career, passed with flying colors.
They called me in for an “emergency” psychological evaluation, and they declared me nuts.
I am a fairly good judge of character, and I found Tice to be humorous, self-deprecating in a healthy and light-hearted way, and consistent on the facts. Tice talked about how he was a pretty darn good football player in junior college, but no star athlete. He talked about how one reporter tried to make him out to be James Bond with leading man looks, and he thought that was ridiculous. We shared some normal “guy talk” about women. Tice has a little anger at the way the NSA tried to whitewash the mass surveillance that he uncovered (wouldn’t you be?), but he wasn’t enraged or over-the-top. Tice is also a patriotic American, not a subversive. Specifically, we spent a long time talking about the importance of the Constitution and the rule of law. In other words, Tice seems “oriented to reality”, completely sane, normal, ethical and bright to me.
And the following facts are more important than my personal impression:
- Many of Tice’s allegations have been confirmed by Snowden and other government whistleblowers. And see this
- Soviet leaders were famous for throwing dissidents into psychiatric wards. Unfortunately, the same thing sometimes happens in modern America
Given the way that the NSA has been repeatedly caught in lies about its surveillance programs – and the way that it has attacked whisteblowers – I believe Tice over the NSA.
Inconsistencies and Unanswered Questions: The Risks of Trusting the Snowden Story
by Kevin Ryan
Global Research
digwithin.net
Jan 1, 2014
Last June, Glenn Greenwald at The Guardian revealed that Edward Snowden was the NSA insider behind “one of the most significant leaks in US political history.” Snowden explained his motivations through Greenwald by saying, “There are more important things than money…. harming people isn’t my goal. Transparency is.”
Such altruistic motivations were welcome news at the time but have come into question recently given that only a tiny fraction of the documents have been released nearly a year after Snowden started working with Greenwald. Perhaps more importantly, billionaire Pierre Omidyar is funding Greenwald’s slow release of those documents. It is worth noting that Omidyar’s Paypal Corporation has links to the NSA.
It was originally reported that the number of documents Snowden had stolen was in the thousands. Today, however, that number is said to be nearly two million. This calls into question Snowden’s early statement, as reported by Greenwald, that he “carefully evaluated every single document to ensure that each was legitimately in the public interest.” The huge, new number also reveals that less than one tenth of one percent of the documents (only about 900) have actually been released to the public.
How could Snowden have “carefully evaluated every single” one of what is now being said to be nearly two million documents? He only worked for Booz Allen Hamilton for a few months. According to NSA Director Keith Alexander, Snowden also worked directly for NSA for twelve months prior to that, which is interesting. But still, that would require carefully evaluating thousands of documents a day during that entire time. Didn’t he have a job apart from that?
Journalist Margie Burns asked some good questions back in June that have not yet been answered. She wondered about the 29-year old Snowden who had been a U.S. Army Special Forces recruit, a covert CIA operative, and an NSA employee in various capacities, all in just a few, short years. Burns asked “How, exactly, did Snowden get his series of NSA jobs? Did he apply through regular channels? Was it through someone he knew? Who recommended him? Who were his references for a string of six-figure, high-level security jobs? Are there any safeguards in place so that red flags go up when a subcontractor jumps from job to job, especially in high-level clearance positions?”
Five months later, journalists Mark Ames and Yasha Levine investigated some of the businesses in which Greenwald’s benefactor Omidyar had invested. They found that the actual practices of those businesses were considerably less humanitarian than the outward appearance of Omidyar’s ventures often portray. The result was that Omidyar took down references to at least one of those businesses from his website.
How to identify CIA limited hangout op?
by Dr. Webster Griffin Tarpley
PressTV
June 18, 2013

American technical contractor and former CIA employee Edward Snowden (file photo)
The operations of secret intelligence agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations.
There is ample reason to believe that the case of Edward Joseph Snowden fits into this pattern. We are likely dealing here with a limited hangout operation, in which carefully selected and falsified documents and other materials are deliberately revealed by an insider who pretends to be a fugitive rebelling against the excesses of some oppressive or dangerous government agency.
But the revelations turn out to have been prepared with a view to shaping the public consciousness in a way which is advantageous to the intelligence agency involved. At the same time, gullible young people can be duped into supporting a personality cult of the leaker, more commonly referred to as a “whistleblower.” A further variation on the theme can be the attempt of the sponsoring intelligence agency to introduce their chosen conduit, now posing as a defector, into the intelligence apparatus of a targeted foreign government. In this case, the leaker or whistleblower attains the status of a triple agent.
Any attempt to educate public opinion about the dynamics of limited hangout operations inevitably collides with the residue left in the minds of millions by recent successful examples of this technique. It will be hard for many to understand Snowden, precisely because they will insist on seeing him as the latest courageous example in a line of development which includes Daniel Ellsberg and Julian Assange, both still viewed by large swaths of naïve opinion as authentic challengers of oppressive government.
This is because the landmark limited hangout operation at the beginning of the current post-Cold War era was that of Daniel Ellsberg and the Pentagon papers, which laid the groundwork for the CIA’s Watergate attack on the Nixon administration, and more broadly, on the office of the presidency itself. More recently, we have had the case of Assange and Wikileaks. Using these two cases primarily, we can develop a simple typology of the limited hangout operation which can be of significant value to those striving to avoid the role of useful idiots amidst the current cascade of whistleblowers and limited hangout artists.
In this analysis, we should also recall that limited hangouts have been around for a very long time. In 1620 Fra Paolo Sarpi, the dominant figure of the Venetian intelligence establishment of his time, advised the Venetian senate that the best way to defeat anti-Venetian propaganda was indirectly. He recommended the method of saying something good about a person or institution while pretending to say something bad. An example might be criticizing a bloody dictator for beating his dog – the real dimensions of his crimes are thus totally underplayed.
Limited hangout artists are instant media darlings
The most obvious characteristic of the limited hangout operative is that he or she immediately becomes the darling of the controlled corporate media. In the case of Daniel Ellsberg, his doctored set of Pentagon papers were published by the New York Times, the Washington Post, the Boston Globe, and eventually by a consortium totaling seventeen corporate newspapers. These press organs successfully argued the case for publication all the way to the United States Supreme Court, where they prevailed against the Nixon administration.
Needless to say, surviving critics of the Warren Commission, and more recent veterans of the 9/11 truth movement, and know very well that this is emphatically not the treatment reserved for messengers whose revelations are genuinely unwelcome to the Wall Street centered US ruling class. These latter are more likely to be slandered, vilified and dragged through the mud, or, even more likely, passed over in complete silence and blacked out. In extreme cases, they can be kidnapped, renditioned or liquidated.
Cass Sunstein present at the creation of Wikileaks
As for Assange and Wikileaks, the autumn 2010 document dump was farmed out in advance to five of the most prestigious press organs in the world, including the New York Times, the London Guardian, El Pais of Madrid, Der Spiegel of Hamburg, and Le Monde of Paris. This was the Assange media cartel, made up of papers previously specialized in discrediting 9/11 critics and doubters. But even before the document dumps had begun, Wikileaks had received a preemptive endorsement from none other than the notorious totalitarian Cass Sunstein, later an official of the Obama White House, and today married to Samantha Power, the author of the military coup that overthrew Mubarak and currently Obama’s pick for US ambassador to the United Nations. Sunstein is infamous for his thesis that government agencies should conduct covert operations using pseudo-independent agents of influence for the “cognitive infiltration of extremist groups” – meaning of those who reject in the establishment view of history and reality. Sunstein’s article entitled “Brave New WikiWorld” was published in the Washington Post of February 24, 2007, and touted the capabilities of Wikileaks for the destabilization of China. Perhaps the point of Ed Snowden’s presence in Hong Kong is to begin re-targeting these capabilities back towards the original anti-Chinese plan.
Snowden has already become a media celebrity of the first magnitude. His career was launched by the US left liberal Glenn Greenwald, now writing for the London Guardian, which expresses the viewpoints of the left wing of the British intelligence community. Thus, the current scandal is very much Made in England, and may benefit from inputs from the British GCHQ of Cheltenham, the Siamese twin of the NSA at Fort Meade, Maryland. During the days of his media debut, it was not uncommon to see a controlled press organ like CNN dedicating one third of every broadcast hour of air time to the birth, life, and miracles of Ed Snowden.
Another suspicious and tell-tale endorsement for Snowden comes from the former State Department public diplomacy asset Norman Solomon. Interviewed on RT, Solomon warmly embraced the Snowden Project and assured his viewers that the NSA material dished up by the Hong Kong defector used reliable and authentic. Solomon was notorious ten years ago as a determined enemy of 9/11 truth, acting as a border guard in favor of the Bush administration/neocon theory of terrorism.
Limited hangouts contain little that is new
Another important feature of the limited hangout operation if that the revelations often contain nothing new, but rather repackage old wine in new bottles. In the case of Ellsberg’s Pentagon Papers, very little was revealed which was not already well known to a reader of Le Monde or the dispatches of Agence France Presse. Only those whose understanding of world affairs had been filtered through the Associated Press, CBS News, the New York Times, and the Washington Post found any of Ellsberg’s material a surprise.
Of course, there was method in Ellsberg’s madness. The Pentagon papers allegedly derived from an internal review of the decision-making processes leading to the Vietnam War, conducted after 1967-68 under the supervision of Morton Halperin and Leslie Gelb. Ellsberg, then a young RAND Corporation analyst and militant warmonger, was associated with this work. Upon examination, we find that the Pentagon papers tend to cover up such CIA crimes as the mass murder mandated under Operation Phoenix, and the massive CIA drug running associated with the proprietary airline Air America. Rather, when atrocities are in question, the US Army generally receives the blame. Politicians in general, and President John F. Kennedy in particular, are portrayed in a sinister light – one might say demonized. No insights whatever into the Kennedy assassination are offered. This was a smelly concoction, and it was not altogether excluded that the radicalized elements of the Vietnam era might have carried the day in denouncing the entire package as a rather obvious fabrication. But a clique around Noam Chomsky and Howard Zinn loudly intervened to praise the quality of the exposé and to lionize Ellsberg personally as a new culture hero for the Silent Generation. From that moment on, the careers of Chomsky and Zinn soared. Pentagon papers skeptics, like the satirical comedian Mort Sahl, a supporter of the Jim Garrison investigation in New Orleans and a critic of the Warren Commission, faced the marginalization of their careers.
Notice also that the careers of Morton Halperin and Leslie Gelb positively thrived after they entrusted the Pentagon papers to Ellsberg, who revealed them. Ellsberg was put on trial in 1973, but all charges were dismissed after several months because of prosecutorial misconduct. Assange lived like a lord for many months in the palatial country house of an admirer in the East of England, and is now holed up in the Ecuadorian Embassy in London. He spent about 10 days in jail in December 2010.
Assange first won credibility for Wikileaks with some chum in the form of a shocking film showing a massacre perpetrated by US forces in Iraq with the aid of drones. The massacre itself and the number of victims were already well known, so Assange was adding only the graphic emotional impact of witnessing the atrocity firsthand.
Limited hangouts reveal nothing about big issues like JFK, 9/11
Over the past century, there are certain large-scale covert operations which cast a long historical shadow, determining to some extent the framework in which subsequent events occur. These include the Sarajevo assassinations of 1914, the assassination of Rasputin in late 1916, Mussolini’s 1922 march on Rome, Hitler’s seizure of power in 1933, the assassination of French Foreign Minister Barthou in 1934, the assassination of President Franklin D. Roosevelt in 1945, in 1963 Kennedy assassination, and 9/11. A common feature of the limited hangout operations is that they offer almost no insights into these landmark events.
In the Pentagon Papers, the Kennedy assassination is virtually a nonexistent event about which we learn nothing. As already noted, the principal supporters of Ellsberg were figures like Chomsky, whose hostility to JFK and profound disinterest in critiques of the Warren Commission were well-known. As for Assange, he rejects any further clarification of 9/11. In July 2010, Assange told Matthew Bell of the Belfast Telegraph: “I’m constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud.” This is on top of Cass Sunstein’s demand for active covert measures to suppress and disrupt inquiries into operations like 9/11. Snowden’s key backers Glenn Greenwald and Norman Solomon have both compiled impressive records of evasion on 9/11 truth, with Greenwald specializing in the blowback theory.
The Damascus road conversions of limited hangout figures
Daniel Ellsberg started his career as a nuclear strategist of the Dr. Strangelove type working for the RAND Corporation. He worked in the Pentagon as an aide to US Secretary of Defense Robert McNamara. He then went to Vietnam, where he served as a State Department civilian assistant to CIA General Edward Lansdale. In 1967, he was back at RAND to begin the preparation of what would come to be known as the Pentagon papers. Ellsberg has claimed that his Damascus Road conversion from warmonger to peace angel occurred when he heard a speech from a prison-bound draft resister at Haverford College in August 1969. After a mental breakdown, Ellsberg began taking his classified documents to the office of Senator Edward Kennedy and ultimately to the New York Times. Persons who believe this fantastic story may be suffering from terminal gullibility.
In the case of Assange, it is harder to identify such a moment of conversion. Assange spent his childhood in the coils of MK Ultra, a complex of Anglo-American covert operations designed to investigate and implement mind control through the use of psychopharmaca and other means. Assange was a denizen of the Ann Hamilton-Byrne cult, in which little children that were subjected to aversive therapy involving LSD and other heavy-duty drugs. Assange spent his formative years as a wandering nomad with his mother incognito because of her involvement in a custody dispute. The deracinated Assange lived in 50 different towns and attended 37 different schools. By the age of 16, the young nihilist was active as a computer hacker using the screen name “Mendax,” meaning quite simply “The Liar.” (Assange’s clone Snowden uses the more marketable codename of “Verax,” the truth teller.) Some of Assange’s first targets were Nortel and US Air Force offices in the Pentagon. Assange’s chief mentor became John Young of Cryptome, who in 2007 denounced Wikileaks as a CIA front.
Snowden’s story, as widely reported, goes like this: he dropped out of high school and also dropped out of a community college, but reportedly was nevertheless later able to command a salary of between $120,000 and $200,000 per year; he claims this is because he is a computer wizard. He enlisted in the US Army in May 2004, and allegedly hoped to join the special forces and contribute to the fight for freedom in Iraq. He then worked as a low-level security guard for the National Security Agency, and then went on to computer security at the CIA, including a posting under diplomatic cover in Switzerland. He moved on to work as a private contractor for the NSA at a US military base in Japan. His last official job was for the NSA at the Kunia Regional SIGINT Operations Center in Hawaii. In May 2013, he is alleged to have been granted medical leave from the NSA in Hawaii to get treatment for epilepsy. He fled to Hong Kong, and made his revelations with the help of Greenwald and a documentary filmmaker Laura Poitras. Snowden voted for the nominally anti-war, ultra-austerity “libertarian” presidential candidate Ron Paul, and gave several hundred dollars to Paul’s campaign.
Snowden, like Ellsberg, thus started off as a warmonger but later became more concerned with the excesses of the Leviathan state. Like Assange, he was psychologically predisposed to the world of computers and cybernetics. The Damascus Road shift from militarist to civil libertarian remains unexplained and highly suspicious.
Snowden is also remarkable for the precision of his timing. His first revelations, open secrets though they were, came on June 5, precisely today when the rebel fortress of Qusayr was liberated by the Syrian army and Hezbollah. At this point, the British and French governments were screaming at Obama that it was high time to attack Syria. The appearance of Snowden’s somewhat faded material in the London Guardian was the trigger for a firestorm of criticism against the Obama regime by the feckless US left liberals, who were thus unwittingly greasing the skids for a US slide into a general war in the Middle East. More recently, Snowden came forward with allegations that the US and the British had eavesdropped on participants in the meeting of the G-20 nations held in Britain four years ago. This obviously put Obama on the defensive just as Cameron and Hollande were twisting his arm to start the Syrian adventure. By attacking the British GCHQ at Cheltenham, Britain’s equivalent to the NSA, perhaps Snowden was also seeking to obfuscate the obvious British sponsorship of his revelations.
Stories about Anglo Americans spying on high profile guests are as old as the hills, and have included a British frogman who attempted an underwater investigation of the Soviet cruiser that brought party leader N. S. Khrushchev for a visit in the 1950s. Snowden has also accused the NSA of hacking targets in China — again, surely no surprise to experienced observers, but guaranteed to increase Sino-American tensions. As time passes, Snowden may emerge as more and more of a provocateur between Washington and Beijing.
Limited hangouts prepare large covert operations
Although, as we have seen, limited hangouts rarely illuminate the landmark covert operations which attempt to define an age, limited hangouts themselves do represent the preparation for future covert operations.
In the case of the Pentagon papers, this and other leaks during the Indo-Pakistani Tilt crisis were cited by Henry Kissinger in his demand that President Richard Nixon take countermeasures to restore the integrity of state secrets. Nixon foolishly authorized the creation of a White House anti-leak operation known as the Plumbers. The intelligence community made sure that the Plumbers operation was staffed by their own provocateurs, people who never were loyal to Nixon but rather took their orders from Langley. Here we find the already infamous CIA agent Howard Hunt, the CIA communications expert James McCord, and the FBI operative G. Gordon Liddy. These provocateurs took special pains to get arrested during an otherwise pointless break-in at the headquarters of the Democratic National Committee in the summer of 1972. Nixon could easily have disavowed the Plumbers and thrown this gaggle of agent provocateurs to the wolves, but he instead launched a cover up. Bob Woodward of the Washington Post, equipped with a top secret security clearance from the Office of Naval Intelligence, then began publicizing the story. The rest is history, and the lasting heritage has been a permanent weakening of the office of the presidency and the strengthening of the worst oligarchical tendencies.
Assange’s Wikileaks document dump triggered numerous destabilizations and coups d’état across the globe. Not one US, British, or Israeli covert operation or politician was seriously damaged by this material. The list of those impacted instead bears a striking resemblance to the CIA enemies’ list: the largest group of targets were Arab leaders slated for immediate ouster in the wave of “Arab Spring.” Here we find Ben Ali of Tunisia, Qaddafi of Libya, Mubarak of Egypt, Saleh of Yemen, and Assad of Syria. The US wanted to replace Maliki with Allawi as prime minister of Iraq, so the former was targeted, as was the increasingly independent Karzai of Afghanistan. Perennial targets of the CIA included Rodriguez Kirchner of Argentina, Berlusconi of Italy, and Putin of Russia. Berlusconi soon fell victim to a coup organized through the European Central Bank, while his friend Putin was able to stave off a feeble attempt at color revolution in early 2012. Mildly satiric jabs at figures like Merkel of Germany and Sarkozy of France were included primarily as camouflage.
Assange thus had a hand in preparing one of the largest destabilization campaigns mounted by Anglo-American intelligence since 1968, or perhaps even 1848.
If the Snowden operation can help coerce the vacillating and reluctant Obama to attack Syria, our new autistic hero may claim credit for starting a general war in the Middle East, and perhaps even more. If Snowden can further poison relations between United States and China, the world historical significance of his provocations will be doubly assured. But none of this can occur unless he finds vast legions of eager dupes ready to fall for his act. We hope he won’t.
WT/HN
Ed Snowden, NSA, and fairy tales a child could see through
by Jon Rappoport
Activist Post
June 25, 2013
Sometimes cognitive dissonance, which used to be called contradiction, rings a gong so loud it knocks you off your chair.
But if you’re an android in this marvelous world of synthetic reality, you get up, put a smile back on your face, and trudge on…
Let’s see. NSA is the most awesome spying agency ever devised in this world. If you cross the street in Podunk, Anywhere, USA, to buy an ice cream soda, on a Tuesday afternoon in July, they know.
They know if you sit at the counter and drink that soda or take it and move to the only table in the store. They know if you lick the foam from the top of the glass with your tongue or pick the foam with your straw and then lick it.
They know if you keep the receipt for the soda or leave it on the counter.
They know whether you’re wearing shoes or sneakers. They know the brand of your underwear. They know your shaving cream, and precisely which container it came out of.
But this agency, with all its vast power and its dollars…
Can’t track one of its own, a man who came to work every day, a man who made up a story about needing treatment in Hong Kong for epilepsy and then skipped the country.
Just can’t find him.
Can’t find him in Hong Kong, where he does a sit-down video interview with Glenn Greenwald of The Guardian. Can’t find that “safe house” or that “hotel” where he’s staying.
No. Can’t find him or spy on his communications while he’s in Hong Kong. Can’t figure out he’s booked a flight to Russia. Can’t intercept him at the airport before he leaves for Russia . Too difficult.
And this man, this employee, is walking around with four laptops that contain the keys to all the secret spying knowledge in the known cosmos.
Can’t locate those laptops. Can’t hack into them to see what’s there. Can’t access the laptops or the data. The most brilliant technical minds of this or any other generation can find a computer in Outer Mongolia in the middle of a blizzard, but these walking-around computers in Hong Kong are somehow beyond reach.
And before this man, Snowden, this employee, skipped Hawaii, he was able to access the layout of the entire US intelligence network. Yes. He was able to use a thumb drive.
He walked into work with a thumb drive, plugged in, and stole…everything. He stole enough to “take down the entire US intelligence network in a single afternoon.”
Not only that, but anyone who worked at this super-agency as an analyst, as a systems-analyst supervisor, could have done the same thing. Could have stolen the keys to the kingdom.
This is why NSA geniuses with IQs over 180 have decided, now, in the midst of the Snowden affair, that they need to draft “tighter rules and procedures” for their employees. Right.
Now, a few pieces of internal of security they hadn’t realized they needed before will be put in place.
This is, let me remind you, the most secretive spying agency in the world. The richest spying agency. The smartest spying agency.
But somehow, over the years, they’d overlooked this corner of their own security. They’d left a door open, so that any one of their own analysts could steal everything.
Could take it all. Could just snatch it away and copy it and store it on a few laptops.
But now, yes now, having been made aware of this vulnerability, the agency will make corrections.
Sure.
And reporters for elite US media don’t find any of this hard to swallow.
A smart sixth-grader could see through this tower of fabricated baloney in a minute, but veteran grizzled reporters are clueless.
Last night, on Charley Rose, in an episode that left me breathless, a gaggle of pundits/newspeople warned that Ed Snowden, walking around with those four laptops, could be an easy target for Chinese spies or Russian spies who could get access to the data on those computers. The spies could just hack in.
But the NSA can’t. No. The NSA can’t find out what Snowden has. They can only speculate.
It’s charades within charades.
This whole Snowden affair is an op. It’s the kind of op that works because people are prepared to believe anything.
The tightest and strongest and richest and smartest spying agency in the world can’t find its own employee. It’s in the business of tracking, and it can’t find him.
It’s in the business of security, and it can’t protect its own data from its employees.
If you believe that, I have timeshares to sell in the black hole in the center of the Milky Way.
In previous articles, I’ve made a case for Snowden being a CIA operative who still works for his former employer. He was handed a bunch of NSA data by the CIA. He didn’t steal anything. The CIA wants to punch a hole in the NSA. It’s called an internal turf war. It’s been going on as long as those agencies have existed side by side.
For example….the money.
Wired Magazine, June 2013 issue. James Bamford, author of three books on the NSA, states:
In April, as part of its 2014 budget request, the Pentagon [which rules the NSA] asked Congress for $4.7 billion for increased ‘cyberspace operations,’ nearly $1 billion more than the 2013 allocation. At the same time, budgets for the CIA and other intelligence agencies were cut by almost the same amount, $4.4 billion. A portion of the money going to…[NSA] will be used to create 13 cyberattack teams.
That means spying money. Far more for NSA, far less for CIA.
Turf war.
But in this article, let’s stay focused on the fairy tales, which are the cover stories floated to the press, the public, the politicians.
We have reporters at the Washington Post and at The Guardian. We have Julian Assange, the head of Wikileaks. They’re all talking to Snowden. The NSA can spy on them. Right? Can listen to their calls and read their emails and hack into their notes. Just like people have been hacking into the work and home computers of Sharyl Attkisson, star CBS investigative reporter.
But the NSA can’t do all this spying and then use it to find Snowden. Just can’t manage it.
So…everybody in the world with a computer has passwords. The NSA can cut through them like a sword through hot butter. But Assange and the Post and Guardian and Snowden must have super-special passwords.
They got these passwords by sending a stamped self-addressed envelope, along with 25 cents, and a top from a cereal box, to The Lone Ranger. These passwords are charged with atomic clouds that obscure men’s minds so they cannot see or spy. They’re immortal and invulnerable.
The NSA can spy on anyone else in the world, but they can’t get their foot in the door, when it comes to the Post, The Guardian, and Assange.
And if Snowden winds up in Ecuador, that too will become an insurmountable mystery.
“Nope, we don’t know where he is. He’s vanished. Ecuador has a Romulan shield surrounding it. The cloaking technology is too advanced.”
Perhaps you recall that, in the early days of this scandal, Snowden claimed he could spy on anyone in the US, including a federal judge or even the president, if he had their email addresses.
Uh-huh. But the combined talents of the NSA, now, can’t spy on Snowden. I guess they just can’t find his email address.
Snowden isn’t the only savvy computer kid in the country. There must be a million people, at minimum, who can cook up email addresses that evade the reach of the NSA. Yes?
What we have here are contradictions piled on contradictions piled on lies.
And in the midst of this, a whole lot of people are saying, “Don’t look too closely. Snowden is a hero and he exposed the NSA and that’s a wonderful thing.”
And a whole lot of other people are saying, “Snowden is a traitor and he should be tried for treason or killed overseas. That’s all you need to know.”
The truth? Well, the truth, as they say, is the first casualty in war. But in the spying business, the truth was never there to begin with. That’s one of the requirements of the industry.
“Son, if you think you’ve lied before, you haven’t got a clue. We’re going to tell you to do things that’ll make your head spin. That’s the game we’re in. We’re going to make you tell lies in your sleep.”
And these are the people the public believes.
It’s a beautiful thing. It really is. The fairy tales are made of sugar and the public, the press, and the people eat them. And then they ask for more.
Jon Rappoport is the author of two explosive collections, The Matrix Revealed and Exit From the Matrix, Jon was a candidate for a US Congressional seat in the 29th District of California. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at www.nomorefakenews.com