Saturday, March 31, 2018

THE PHOENIX PROGRAM: ELIMINATION OF PERCIEVED DISSIDENTS



This is meant to be a resource for those researching the Phoenix Program. As you will find, it has a long and deep seated place in the arsenal of the Central Intelligence Agency (CIA). While it has been unleashed under other names, by tyrants and intelligence agencies of various regimes, the CIA has the dubious distinction of being the first to use it on a planetary basis. However, the CIA is now a collection of private military contractors comprising upwards of 50% of the once proud agency. The privatization of the agency raises concerns regarding oversight and mission. Contractors are not held to the same standards as government or military employees. They are not legally bound by the laws and policies of the United States government in respects to the military. If Posse Comitatus was enacted to forbid the military to conduct operations against the citizens of the United States, does the same hold true for military contractors? The answer is no.

If you follow the agency’s world operations from it’s inception to the present day, you find it has implemented the Phoenix Program in most of the countries of the world. Since it is not in the interests of the U.S. government to eliminate dissidents across the globe indiscriminately, there is an fundamental disconnect between the stated policies of the U.S. government and the goals of the private military corporations that now comprise the CIA. This should concern everyone.

THE DEPARTMENT OF HOMELAND SECURITY'S NEW PHOENIX PROGRAM

 

The Phoenix Program was a Central Intelligence Agency (CIA) initiative designed to destroy the Vietcong (VC) support infrastructure in Vietnam during the war. Unlike the military, the CIA wasn't engaged in combat with the VC. The CIA wages war on civilian populations, it's targets are civilians. The infrastructure the agency sought to eliminate was the support for the VC provided by civilians. Among these resources were Communist Party leaders, administrators, couriers, security forces and intelligence assets. These resources were neutralized through kidnapping, indefinite detention, interrogation centers, assassination, and imprisonment.


The Phoenix Program and Development of Homeland Security (Audio)
The Phoenix Program and Development of Homeland Security (Audio)
The linked video below contains an interview with Douglas Valentine, the author of "The CIA as Organized Crime", "The Phoenix Program", "TDY", and "The Strength of the Wolf: The Secret History of America's War on Drugs." Valentine draws parallels between Vietnam's Phoenix Program and programs the Department of Homeland Security (DHS) have in place today, 52 years later in the United States. Valentine notes the similarities between tactics such as a system of paid informants, indefinite detention without trial, torture, assassinations, and interrogation centers. He also points out the Phoenix Program consolidated 25 intelligence programs including those run by The Army, Navy, and the South Vietnamese, similar to the rolling up of domestic terrorism intelligence programs under DHS.

A RETROSPECTIVE ON COUNTERINSURGENCY OPERATIONS - THE TAY NINH PROVINCIAL RECONNAISSANCE UNIT AND ITS ROLE IN THE PHOENIX PROGRAM, 1969-70

 

Anit-Phoenix Program Poster from Vietnam featuring William Colby then director of the program.



“By 1967, the US Military Assistance Command, Vietnam (MACV), had succeeded in consolidating all military and civilian pacification efforts into one entity, called Civil Operations and Revolutionary Development Support (CORDS).“


“Another component of CORDS was the Phoenix Program. Although Phoenix was run and ostensibly controlled by the Saigon government, CIA funded and administered it. Phoenix built on the work of the CIA-created network of over 100 provincial and district intelligence operation committees in South Vietnam that collected and disseminated information on the VCI to field police and paramilitary units.“


“The PRUs became probably the most controversial element of Phoenix. They were special paramilitary forces that were originally developed in 1964 by the government of South Vietnam and CIA. Initially, they were known as Counter-Terror Teams." 

https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/a-retrospective-on-counterinsurgency-operations.html

 

THE ARMY'S PROJECT X TAUGHT TORTURE TECHNIQUES TO LATIN AMERICAN (AND AMERICAN) MILITARY PERSONNEL

 

As a researcher it strikes me how often I encounter references to Central Intelligence Agency (CIA) operations such as MKULTRA and The Phoenix Program. They are mentioned so much that I believe the magnitude of the crimes committed under their banners are lost on us. Given that, it perplexes me how ignorant people are of these programs. The programs are a reality. The details surrounding their development, execution, and in some cases, demise, raise serious concerns about lack of oversight and accountability. 


Torture is a crime condemned internationally as well as nationally. Considered a crime against humanity by all nations. While very clear laws, rules, treaties, as well as social morality all forbid the use of torture in both war and peace, military and intelligence communities disregard the law of the world for purposes known only to themselves.


In the featured article (sourced from the NSA Archives), we find an U.S. Army training manual, Project X, used at the Western Hemisphere Institute for Security Cooperation (WHINSEC, formerly the School of the America's) to train Latin American armed forces. Project X collects the torture techniques from sources such as MKULTRA and the Phoenix Project. WHINSEC's stated goal was to provide anti-communist counterinsurgency training. During the 1980's it taught torture, and did so up until 1992 when the DoD ordered all copies destroyed.


As an American, the act of training our military in the practice of torture techniques, as well as that of foreign military, is counter to international law and portrays America as a people who condone the use of torture for political goals. As we travel the globe and encounter people from nations the CIA and military interrogators have tortured, we should understand the less than enthusiastic welcome we receive is due to the complete disregard for human rights law our military intelligence agencies demonstrate. 


My reasons for sharing this information is to draw attention to practices by military and intelligence agencies that contradict their mission, law, and our own ethical and moral codes. However, the CIA is a government unto itself. When created, it was given power that precluded it from oversight and accountability. It not only conducts operations overseas but here as well. In the case of MKULTRA, when discovered they were operating on American soil, they destroyed all documents pertaining to their crimes and covered up the rest. Although the Church Committee found wrongdoing, no one was prosecuted for it. If we ever learn the full truth about what the CIA has done and is doing in our name, it will be a black day for our nation.


The featured link contains five documents:

CIA, KUBARK Counterintelligence Interrogation, July 1963 (released February 25, 2014)

 

CIA, KUBARK Counterintelligence Interrogation, July 1963 (released January 1997)

 

"This 128-page report, classified Secret, was drafted in July 1963 as a comprehensive guide for training interrogators in the art of obtaining intelligence from "resistant sources." (As indicated above, two versions of the document — declassified 17 years apart — are presented in this posting.) KUBARK — a CIA codename for itself — describes the qualifications of a successful interrogator, and reviews the theory of non-coercive and coercive techniques for breaking a prisoner. Some recommendations are very specific. The report recommends, for example, that in choosing an interrogation site "the electric current should be known in advance, so that transformers and other modifying devices will be on hand if needed." Of specific relevance to the current scandal in Iraq is section nine, "The Coercive Counterintelligence Interrogation of Resistant Sources," (pp 82-104). Under the subheading, "Threats and Fears," the CIA authors note that "the threat of coercion usually weakens or destroys resistance more effectively than coercion itself. The threat to inflict pain, for example, can trigger fears more damaging than the immediate sensation of pain." Under the subheading "Pain," the guidelines discuss the theories behind various thresholds of pain, and recommend that a subject's "resistance is likelier to be sapped by pain which he seems to inflict upon himself" such rather than by direct torture. The report suggests forcing the detainee to stand at attention for long periods of time. A section on sensory deprivations suggests imprisoning detainees in rooms without sensory stimuli of any kind, "in a cell which has no light," for example. "An environment still more subject to control, such as water-tank or iron lung, is even more effective," the KUBARK manual concludes."


CIA, Human Resource Exploitation Training Manual - 1983

 

"This secret manual was compiled from sections of the KUBARK guidelines and from U.S. Military Intelligence field manuals written in the mid 1960s as part of the Army's Foreign Intelligence Assistance Program codenamed "Project X." The manual was used in numerous Latin American countries as an instructional tool by CIA and Green Beret trainers between 1983 and 1987 and became the subject of executive session Senate Intelligence Committee hearings in 1988 because of human rights abuses committed by CIA-trained Honduran military units. The manual allocates considerable space to the subject of "coercive questioning" and psychological and physical techniques. The original text stated that "we will be discussing two types of techniques, coercive and non-coercive. While we do not stress the use of coercive techniques, we do want to make you aware of them." After Congress began investigating human rights violations by U.S.-trained Honduran intelligence officers, that passage was hand edited to read "while we deplore the use of coercive techniques, we do want to make you aware of them so that you may avoid them." Although the manual advised methods of coercion similar to those used in the Abu Ghraib prison by U.S. forces, it also carried a prescient observation: "The routine use of torture lowers the moral caliber of the organization that uses it and corrupts those that rely on it….""

DOD, Improper Material in Spanish-Language Intelligence Manuals, SECRET, 10 March 1992

 

"This "report of investigation" was sent to then Secretary of Defense Richard Cheney in March 1992, nine months after the Defense Department began an internal investigation into how seven counterintelligence and interrogation manuals used for years by the Southern Command throughout Latin America had come to contain "objectionable" and prohibited material. Army investigators traced the origins of the instructions on use of beatings, false imprisonment, executions and truth serums back to "Project X"-a program run by the Army Foreign Intelligence unit in the 1960s. The report to Cheney found that the "offensive and objectionable material in the manuals" contradicted the Southern Command's priority of teaching respect for human rights, and therefore "undermines U.S. credibility, and could result in significant embarrassment." Cheney concurred with the recommendations for "corrective action" and recall and destruction of as many of the offending manuals as possible."


DOD, USSOUTHCOM CI Training-Supplemental Information, CONFIDENTIAL, 31 July, 1991

 

"This document records a phone conversation with Major Victor Tise, who served in 1982 as a counterintelligence instructor at the School of the Americas. Tise relates the history of the "objectionable material" in the manuals and the training courses at SOA. A decade of training between 1966 and 1976 was suspended after a Congressional panel witnessed the teaching program. The Carter administration then halted the counterintelligence training courses "for fear training would contribute to Human Rights violations in other countries," Tise said, but the program was restored by the Reagan administration in 1982. He then obtained training materials from the archives of the Army's "Project X" program which he described as a "training package to provide counterinsurgency techniques learned in Vietnam to Latin American countries." The course materials he put together, including the manuals that became the subject of the investigations, were sent to Defense Department headquarters "for clearance" in 1982 and "came back approved but UNCHANGED." Although Tise stated he removed parts he believed to be objectionable, hundreds of unaltered manuals were used throughout Latin America over the next nine years."



Friday, March 23, 2018

THE A-Z OF TORTURE: AN ILLUSTRATED GUIDE

https://www.vice.com/en_us/article/exm99z/an-illustrated-a-z-of-torture-cia-284This is an illustrated guide to the torture techniques of CIA conducted at their Black Sites. At all times you should remember if you are an American, these acts are done in your name. This is how we are viewed by the world. 

Next time you're traveling in a foreign country, what is your comfort level with people knowing you are American? Would you wear a shirt with the U.S. flag on it in one of the countries we are accused of torturing people in? Would you feel safe?

https://www.vice.com/en_us/article/exm99z/an-illustrated-a-z-of-torture-cia-284

STROLL DOWN MEMORY LANE: A TIMELINE OF CIA ATROCITIES

https://www.globalresearch.ca/a-timeline-of-cia-atrocities/5348804/ampFew Americans are aware of the history of CIA operations around the world. The CIA would like you to believe they are patriots with nothing but the best intentions for the entire world. That they sit in a circle, hold hands, and sing Kumbaya all day. The CIA is a secret military organization. They distribute death, destruction, and mayhem across the planet in the name of America. Unfortunately, they are now operating here as well. 

The proof of this statement is evident when you compare the programs they have conducted in other countries to what is happening here right now. What you would expect find is an environment of division with an extremely polarized society, accomplished through propaganda. This is done to prevent an entire population from arriving at a consensus unfavorable to a program's stated goals. 

The bulk of the Agency's operations are related to manufacturing an environment of revolution through the creation of dissent. Dissent inherently creates dissidents. Dissidents are a force of revolution. Revolution is used to depose a dictator or government. As you will see in the timeline, the CIA has run programs like Phoenix in many countries. Usually to install a dictator or puppet in the seat of power.

In recent polls American's have shown they do not trust the government. Corruption, partisan politics, and a disregard for the people being governed leave American society disillusioned. The recent loss of freedoms, protracted "wars" carried out by military contractors, mass surveillance, and a multi-tiered justice system have likewise contributed to Washington's lack of credibility.
Whatever the CIA has planned, it will not bode well for the citizens it portends to protect. Perhaps the desire of past presidents to disband the Agency would have taken us in a better direction.

https://www.globalresearch.ca/a-timeline-of-cia-atrocities/5348804/amp

WORMWOOD: THE DEATH OF FRANK OLSEN

https://www.independent.com/news/2018/mar/08/wormwood-probes-mysterious-death-cia-biological-wa/The death of Frank Olsen has always been tied closely to the CIA's human experimentation program MKULTRA. In Netflix's Wormwood documentary series, Frank Olsen's son, Eric Olsen, embarks on a life-long journey to discover what really happened to his father. The deeper he looked, the less the official CIA story made sense. What ensues is an epic battle between one man and the CIA.

Only one spoiler here. The Agency murdered Frank Olsen because, as a Biological Warfare Scientist, he was appalled that the U.S. was using biological weapons against the Korean people and denying it. This made Frank Olsen a dissident in the eyes of the CIA. Proof that the agency cannibalizes it's own when caught with its pants down.

Hopefully history will correct the story of Frank Olsen now. He didn't fall out of a window. He was killed for trying to do the right thing. 

https://www.independent.com/news/2018/mar/08/wormwood-probes-mysterious-death-cia-biological-wa/

THE CIA'S WAR ON DISSIDENTS: PART 2

https://www.aclu.org/blog/national-security/former-cia-director-order-spy-domestic-dissidents-just-call-them-terrorists Who are the dissidents that the CIA targets? You and I, of course. Why are we considered dissidents? That is a very good question!

The qualities that distinguish a dissent from a regular citizen are esoteric at best. Getting on the wrong side of one of the CIA's drug peddlers could get you branded as dissident. So could campaigning against a candidate that they are backing for dubious reasons. A paid snitch might drop your name to the See Something Say Something hotline. If you are labeled a dissident, you will carry that designation for life.

As the featured article points out, it is easier to target a dissident if we just call them terrorists. By sheer coincidence, the Department of Homeland Security labeled large swathes of American citizens as terrorists shortly after 9/11. Gun owners, former military personnel, former law enforcement, Christians, Patriots, people who believe in the Constitution, and many, many, more groups are considered potential terrorists. These statements are fact and are not new to those who are paying attention.
So how does a terrorist act perpetrated by foreign actors become a witch hunt for domestic "terrorists"? To put it plainly, that was the purpose of the event. This carries over to events that are happening now. It must be clear that the intent of these public massacres serves one purpose. To disarm us. Because we are potential terrorists. 

Before 9/11, the incidence of mass shootings were very, very low. After 9/11 they are very, very common. We are to take this as purely coincidence. Or perhaps we should believe that 9/11 instigated these events somehow? That post-9/11 America is somehow less safe. This is true. America is less safe because the laws have been changed to allow law enforcement, military and intelligence agencies to conduct their activities in secret, with no accountability and no oversight.

The CIA wants you to believe that the world is an unsafe place, yet they hide the fact they are the danger. The world they want for us is not one we would accept willingly. It is one where the government is a manager of corporations they pay to manage us. It is a world where corporations set the rules and the rules are aimed at draining us of everything we have, earn, and will earn.
The definition of the word dissident is "a person who opposes official policy, especially that of an authoritarian state." (Oxford Dictionaries). When did the U.S. become a totalitarian state? Some believe it was when the CIA was formed. Others say it was when they murdered a sitting president of the United states. In either case, the United States will not fall without the help of our "protectors", the CIA.

Maybe we should change the definition of dissident to anyone who works for the Central Intelligence Agency? 

https://www.aclu.org/blog/national-security/former-cia-director-order-spy-domestic-dissidents-just-call-them-terrorists

THE CIA'S WAR ON DISSIDENTS: PART 1

https://www.theguardian.com/us-news/2017/may/05/cia-long-history-kill-leaders-around-the-world-north-koreaThe CIA needs dissidents. They need dissidents in order to depose world leaders who do not tow their line. If you are one of these leaders, your days are numbered. Our top intelligence agency will infiltrate your country and create political dissidents and arm the resistance to your government. 

Why? One reason is the need for an enemy to demonize. Demonic enemies unite the people of our country. Our favorite target is Russia. It isn't that Russia is evil. It is because they exist. While they may not be our enemy, the enemy of the people of the United States, they are the enemy of the CIA, and that makes them every citizen's enemy.

It seemed for some time Russia might get a sabbatical from being the preferred enemy of the state, however, there just aren't any other enemies big enough to pose a threat that would warrant the size of the budget increases the Military Industrial Complex requires every year. Without Russia, there would be no increases.

The corruption at the Agency is systemic. It runs so deep and so wide that if, by some miracle, all of the deeds that they have committed in our name and upon us were made public, it is likely the U.S. government would fall. 

Poor decision making is forgivable. Intentional acts of pure evil are not.

https://www.theguardian.com/us-news/2017/may/05/cia-long-history-kill-leaders-around-the-world-north-korea

FISA SECTION 702 RENEWED BY CONGRESS

https://www.aclu.org/blog/national-security/privacy-and-surveillance/members-congress-just-voted-give-trumpI voted for Donald Trump in hopes he would drain the swamp. Unfortunately, he just installed a hot tub and wet bar for the swamp creatures. Can I retract my vote? 

5 years after Snowden released information exposing the practices of warrantless surveillance and other freedom killing acts our government passed the FISA Amendments Reauthorization Act. Lesson not learned. Do not pass go, do not collect $200. Are the people of this country asleep? How does this happen?

https://www.aclu.org/blog/national-security/privacy-and-surveillance/members-congress-just-voted-give-trump

FUNCTIONALIZED COATING FOR ENHANCED NEURAL INTERFACES

https://www.sbir.gov/sbirsearch/detail/152871The development of a biologically active coating for electrodes used in recording and stimulation of the nervous system is proposed. The coating is based on a co-polymer of poly(ethylene glycol)/polylactic acid (PEG-PLA) that contains a neurotrophic factor as a slowly releasable constituent. Release of the neurotrophin promotes the extension of neural processes to the electrode surface. The close proximity of the electrode to viable neural processes will enhance the stability and sensitivity of neural recordings and may reduce charge- injection thresholds for neural excitation. Surface treatment of electrodes with cell adhesion peptides will also be evaluated as a means of preserving the interface once the neurotrophic factor is exhausted. Our objectives for the Phase II effort are 1) to assess the benefits of neurotrophin-eluting polymers on microelectrodes implanted in an animal model appropriate to intracortical recording for direct thought-based control of extracorporal devices for the spinal cord injured, 2) to assess the benefit of neurotrophin-eluting coatings on stimulation electrodes in a model of neurodegenerative disease, specifically retinal stimulation electrodes in visual prostheses for retinitis pigmentosa, and 3) to evaluate the use of surface-bound coatings of peptide adhesion molecules to chronically stabilize the close proximity of neural processes at the electrode surface established by short-term neurotrophin elution. Prostheses are being developed for individuals with spinal cord injury, deafness, blindness and diseases that impair movement. These prostheses will function by electrically stimulating nerves or by recording nerve activity in the brain. The use of biodegradable coatings on these electrodes to enhance the electrical connection between the implanted metal electrodes and nerve cells in the brain is proposed. The coatings will elute biologically active molecules that encourage nerve cells to grow to the implanted electrodes, increasing the efficiency and reliability of the stimulation and recording properties of the prostheses. 


PLATFORM FOR NEURAL MONITORING

https://www.sbir.gov/sbirsearch/detail/307967"Our project will produce a product that will allow neuroscientists and physiologists to better understand the function of the nervous system, and to perform novel experiments interfacing neural models with biological neurons. By using this system, researchers will be able to develop novel treatments for treating neurological disorders and repairing traumatic neural injury."

 https://www.sbir.gov/sbirsearch/detail/307967

GOVERNMENT TECH: WIRELESS NEURAL RECORDING FOR MICE


USAID: CIA FRONT COMPANY SOWS THE SEEDS OF DISSENT WORLDWIDE

http://www.intrepidreport.com/archives/12659 This is a follow up to another article I posted on the CIA and DAI. The link to part 1 is at the bottom of this one. 

According to the featured article, the U.S. Agency for International Development (USAID) is involved in contract fraud inside State Department. Development Alternatives Incorporated (DAI) is a CIA contractor with a history of creating dissent and promoting revolution in foreign countries, Cuba for example. This Program run in Cuba the same as USAID/CIA/DAI programs in the Ukraine, Syria, Libya, Egypt, and Iran.

"On December 10th, 2009 an employee of DAI, a CIA contractor, was "accused of subversion and distribution of illegal materials to counterrevolutionary groups" in Cuba. This CIA contractor was a part of a USAID program named "The Cuba Democracy and Contingency Planning Program." "DAI was awarded a $40 million USD contract in 2008 to help the U.S. government “support the peaceful activities of a broad range of nonviolent organizations through competitively awarded grants and subcontracts” in Cuba."[1]

The DAI, in conjunction with the CIA, created an app known as the Cuban Twitter which was dubbed ZunZuneo. Most Cuban people who used the app had no idea it was a covert tool for spreading propaganda in an attempt to destabilize the Cuban government.
“In addition, USAID funding documents for the ZunZuneo (a Cuban slang word for a hummingbird’s tweet) and other “civil society” projects state that USAID money went to “miscellaneous foreign contractors” and domestic contractors (undisclosed)” to support the Cuban initiatives. ZunZuneo was a pet project of then-Secretary of State Hillary Clinton, who, according to AP, had her social media chief Suzanne Hall, contact Twitter founder Jack Dorsey to take over ZunZuneo. Dorsey has refused comment on the report.”[2]

“CAI was not the only entity awarded USAID Office of Transition Initiatives (OTI) money to help foment dissension and rebellion in Cuba as part of USAID’s “civil society program.” Other recipients included the International Republican Institute (IRI), a branch of the Republican Party; the National Democratic Institute, a branch of the Democratic Party; the Pan American Development Foundation, on whose board of trustees are found lobbyists for Exxon Mobil, Chevron, Caterpillar, Greenberg Traurig, Royal Caribbean Cruise Lines, Citibank, Unibank of Haiti, Educational Testing Service (ETS),and Occidental Petroleum; Loyola University of Chicago; Center for a Free Cuba (which was caught embezzling $570,000 from USAID in 2008); the neo-conservative non-profit Freedom House; the Christian evangelical group Echo Cuba; Cuba On-Line; the Miami-based Plantados Until Freedom and Democracy in Cuba; and Development Alternatives, Inc. (DAI)/Nathan Group.”

“ZunZuneo was created just after the December 2009 arrest in Cuba of DAI sub-contractor for USAID Alan Gross who was allegedly setting up satellite equipment and computer networks in Cuba to provide greater Internet access to Cuba’s Jewish community. Cuba’s Jewish community leaders denied any knowledge of the project or even knowing Gross, who was sentenced by Cuba to 15 years in prison for espionage. Gross’s firm, JBDC, was subcontracted to DAI for the “civil society” work in Cuba.”

"Obama’s mother, Stanley Ann Dunham, worked on micro-financing projects for the USAID and Ford Foundation, both linked to the CIA, that helped prop up dictatorships in Indonesia and Pakistan."
 
[1] http://www.intrepidreport.com/archives/12659
[2] https://nsarchive2.gwu.edu/NSAEBB/NSAEBB411/
[3] https://www.globalresearch.ca/cia-agents-assassinated…/16733

Link to first article: https://www.facebook.com/mark.cottell.7/posts/2011545005770842?pnref=story

CIA SUPPORT TO DHS: INTELLIGENCE OPERATIONS INSIDE THE U.S.

https://www.globalsecurity.org/security/library/congress/2003_h/030724-lago.docMore evidence the Agency is spying on us. The question is what else are they doing? Spying on us is boring work for these guys. How do they keep themselves entertained? It could be managing propaganda, torturing dissidents, and manipulating society as this is what they do in other countries.

To understand their involvement in any country you just need to examine what they actually do. They are a military intelligence agency that prepares a foreign country for our war machine, to replace the leaders in other countries with ones who will obey orders, to remove resistance in the population, and deny the enemy resources.

https://www.globalsecurity.org/security/library/congress/2003_h/030724-lago.doc

CIA CONTRACTOR ARREST IN CUBA 2009 REVEALS ABUSES AND MORE EMBARRASSMENT

 This article details connections between the deaths of CIA contractors in Afghanistan and the arrest of a contractor from the same company in Cuba to the U.S. Agency for International Development (USAID).  On December 10th, 2009 an employee of DAI, a CIA contractor, was "accused of subversion and distribution of illegal materials to counterrevolutionary groups" in Cuba. This CIA contractor was a part of a USAID program named "The Cuba Democracy and Contingency Planning Program." "DAI was awarded a $40 million USD contract in 2008 to help the U.S. government “support the peaceful activities of a broad range of nonviolent organizations through competitively awarded grants and subcontracts” in Cuba."  On December 15th, 2009, 5 "civilians" from the same government contractor, DAI, were killed at the USAID office in Gardez, Afghanistan. Another bomb exploded in Kabul the same day, no one was injured.  8 CIA contractors from the company DAI were killed in a suicide bombing in Khost, Afghanistan on December 30, 2009.  "On December 15, DAI published a press release mourning “project personnel killed in Afghanistan. “DAI is deeply saddened to report the deaths of five staff associated with our projects in Afghanistan… On December 15, five employees of DAI’s security subcontractor were killed by an explosion in the Gardez office of the Local Governance and Community Development (LGCD) Program, a USAID project implemented by DAI.”  "A high-level USAID official confirmed two weeks ago that the CIA uses USAID’s name to issue contracts and funding to third parties in order to provide cover for clandestine operations. The official, a veteran of the U.S. government agency, stated that the CIA issues such contracts without USAID’s full knowledge."  The moral of this story is the CIA uses private security contractors to conduct covert operations under the guise of U.S. foreign social and civil society programs. These programs are used to accomplish goals such as creating rebel groups, resistance forces and train assets in countries the U.S. has interests in. However, these types of operations give the appearance the people of the U.S. are aware and complicit with the perpetrators. Of course, this is not the case.This article details connections between the deaths of CIA contractors in Afghanistan and the arrest of a contractor from the same company in Cuba to the U.S. Agency for International Development (USAID).

On December 10th, 2009 an employee of DAI, a CIA contractor, was "accused of subversion and distribution of illegal materials to counterrevolutionary groups" in Cuba. This CIA contractor was a part of a USAID program named "The Cuba Democracy and Contingency Planning Program." "DAI was awarded a $40 million USD contract in 2008 to help the U.S. government “support the peaceful activities of a broad range of nonviolent organizations through competitively awarded grants and subcontracts” in Cuba."

On December 15th, 2009, 5 "civilians" from the same government contractor, DAI, were killed at the USAID office in Gardez, Afghanistan. Another bomb exploded in Kabul the same day, no one was injured.

8 CIA contractors from the company DAI were killed in a suicide bombing in Khost, Afghanistan on December 30, 2009.

"On December 15, DAI published a press release mourning “project personnel killed in Afghanistan. “DAI is deeply saddened to report the deaths of five staff associated with our projects in Afghanistan… On December 15, five employees of DAI’s security subcontractor were killed by an explosion in the Gardez office of the Local Governance and Community Development (LGCD) Program, a USAID project implemented by DAI.” 

"A high-level USAID official confirmed two weeks ago that the CIA uses USAID’s name to issue contracts and funding to third parties in order to provide cover for clandestine operations. The official, a veteran of the U.S. government agency, stated that the CIA issues such contracts without USAID’s full knowledge."

The moral of this story is the CIA uses private security contractors to conduct covert operations under the guise of U.S. foreign social and civil society programs. These programs are used to accomplish goals such as creating rebel groups, resistance forces and train assets in countries the U.S. has interests in. However, these types of operations give the appearance the people of the U.S. are aware and complicit with the perpetrators. Of course, this is not the case.

https://www.globalresearch.ca/cia-agents-assassinated-in-afghanistan-worked-for-contractor-active-in-venezuela-and-cuba/16733

 https://nsarchive2.gwu.edu/NSAEBB/NSAEBB411/

CIA HACKS: CHERRYBLOSSOM

 Below is an excerpt taken from Wikileaks that describes one (of many) hacks the CIA uses to infiltrate American civilian (and other countries) WiFi Routers. The civilian population of the world should be aware the CIA has been let loose on them and there is no reasonable expectation of privacy anywhere in the world.  "Cherry Blossom 15 June, 2017  Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).  CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.  The wireless device itself is compromized by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection. Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap. A FlyTrap will beacon over the Internet to a Command & Control server referred to as the CherryTree. The beaconed information contains device status and security information that the CherryTree logs to a database. In response to this information, the CherryTree sends a Mission with operator-defined tasking. An operator can use CherryWeb, a browser-based user interface to view Flytrap status and security info, plan Mission tasking, view Mission-related data, and perform system administration tasks.  Missions may include tasking on Targets to monitor, actions/exploits to perform on a Target, and instructions on when and how to send the next beacon. Tasks for a Flytrap include (among others) the scan for email addresses, chat usernames, MAC addresses and VoIP numbers in passing network traffic to trigger additional actions, the copying of the full network traffic of a Target, the redirection of a Target’s browser (e.g., to Windex for browser exploitation) or the proxying of a Target’s network connections. FlyTrap can also setup VPN tunnels to a CherryBlossom-owned VPN server to give an operator access to clients on the Flytrap’s WLAN/LAN for further exploitation. When the Flytrap detects a Target, it will send an Alert to the CherryTree and commence any actions/exploits against the Target. The CherryTree logs Alerts to a database, and, potentially distributes Alert information to interested parties (via Catapult)."  https://wikileaks.org/vault7/#Cherry%20Blossom Below is an excerpt taken from Wikileaks that describes one (of many) hacks the CIA uses to infiltrate American civilian (and other countries) WiFi Routers. The civilian population of the world should be aware the CIA has been let loose on them and there is no reasonable expectation of privacy anywhere in the world. 

"Cherry Blossom
15 June, 2017

Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).
CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.

The wireless device itself is compromized by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection. Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap. A FlyTrap will beacon over the Internet to a Command & Control server referred to as the CherryTree. The beaconed information contains device status and security information that the CherryTree logs to a database. In response to this information, the CherryTree sends a Mission with operator-defined tasking. An operator can use CherryWeb, a browser-based user interface to view Flytrap status and security info, plan Mission tasking, view Mission-related data, and perform system administration tasks.

Missions may include tasking on Targets to monitor, actions/exploits to perform on a Target, and instructions on when and how to send the next beacon. Tasks for a Flytrap include (among others) the scan for email addresses, chat usernames, MAC addresses and VoIP numbers in passing network traffic to trigger additional actions, the copying of the full network traffic of a Target, the redirection of a Target’s browser (e.g., to Windex for browser exploitation) or the proxying of a Target’s network connections. FlyTrap can also setup VPN tunnels to a CherryBlossom-owned VPN server to give an operator access to clients on the Flytrap’s WLAN/LAN for further exploitation. When the Flytrap detects a Target, it will send an Alert to the CherryTree and commence any actions/exploits against the Target. The CherryTree logs Alerts to a database, and, potentially distributes Alert information to interested parties (via Catapult)."

https://wikileaks.org/vault7/#Cherry%20Blossom

A CASE OF TIPPED SCALES: INSTITUTIONALIZED VICTIMIZATION IN THE FORM OF LEGAL PRECEDENT

https://mb22575.wordpress.com/2014/05/14/richard-l-cain-plaintiff-v-city-of-ventura-et-al-defendants/The case Richard Cain brought against the government doomed from it’s inception. In order to defeat the U.S. military apparatus in a U.S. courtroom, you need large and experienced legal teams. In order to survive the ordeal ,however, you would need to be a foreign government. Or a plaintiff in a lawsuit in an International Court of Law.

Within the United States the agencies and their surrogates will never see a courtroom let alone see the inside of a cell. The laws were changed to permit what they are doing. It is legal. Labels are placed on everyone. Profiles are applied using Artificial Intelligence to determine who is most likely to be a dissident or a domestic terrorist based on social media habits and cell phone data. Dissidents won’t be tolerated in the new security state. 

https://mb22575.wordpress.com/2014/05/14/richard-l-cain-plaintiff-v-city-of-ventura-et-al-defendants/

BLACK BUDGET ANALYSIS

 http://www1.american.edu/salla/Articles/BB-CIA.htm"This report examines the existence of a CIA black budget and an extensive network of deep black projects that it funds. The report identifies the legal framework established by the US Congress for the creation of a CIA black budget from the appropriations earmarked for other federal agencies that are siphoned through the CIA as the sole conduit of black budget funds. The report investigates the legal challenges to the constitutionality of the CIA's black budget; how the CIA uses its legal authority to extract appropriations from government agencies such as HUD; how the CIA launders non-appropriated money through other federal agencies; and the efforts the CIA goes to prevent these financial transfers from being exposed.

Using as a case study the legal difficulties faced by an innovative mortgage finance company, Hamilton Securities, the report will argue that the CIA's covert role in Hamilton's demise is compelling evidence that the CIA was involved in funding irregularities in HUD. It will be finally argued that the size of black budget, the secrecy surrounding it, the extent senior officials in Federal agencies go to targeting individuals and companies that threaten to reveal where congressional appropriations are ultimately going, suggest a vast number of deep black projects that collectively form a highly classified second Manhattan Project whose existence, goals and budget are kept secret. "

http://www1.american.edu/salla/Articles/BB-CIA.htm

CIA TECH GIANTS: MORE UNREPORTED FUNDING SOURCES


THE INTELLIGENCE BLACK BUDGET: MONEY FOR NOTHING

http://www.washingtonpost.com/wp-srv/special/national/black-budget/Intelligence agencies have a 52.6 billion dollar Black Budget to draw on which they do not need to account for. Maybe if that were the end of this story I wouldn't need to make this post. However, they also have access to billions more through their own Venture Capital firms, illicit drug sales, and other business ventures. As with the Black Budget, they are not required to report profits. The topic goes much deeper than this and there is scant room for the details here. I feel if they want to work against the interests of the American people they should completely fund their own operations. Without any accountability or oversight, they shouldn't be trusted with our money.

http://www.washingtonpost.com/wp-srv/special/national/black-budget/

Thursday, March 22, 2018

THE CIA CONSIDERED NELSON MANDELA A TERRORIST FOR 15 YEARS AFTER HE WON THE NOBEL PEACE PRIZE

https://www.aclu.org/blog/free-speech/rights-protesters/why-dhs-labeling-protesters-domestic-terroristsThe title of this post is shocking but even more so is the fact that they assisted the South African government in capturing him, sending him to prison for 27 years. 

 https://www.aclu.org/blog/free-speech/rights-protesters/why-dhs-labeling-protesters-domestic-terrorists

CIA TORTURE AND RENDITION: CITIZEN’S FIGHT BACK!

https://www.hrw.org/news/2017/11/28/north-carolina-citizens-commission-examines-us-torture
https://www.hrw.org/news/2017/11/28/north-carolina-citizens-commission-examines-us-torture

FUNDING MURDER: THE CIA’S DRUG EMPIRE


https://www.motherjones.com/politics/1998/06/history-101-cia-drugs/


https://www.motherjones.com/politics/1998/06/history-101-cia-drugs/

WHO WERE THE GOVERNMENT EMPLOYEES TARGETED IN THE CUBAN "SONIC ATTACKS"? CIA OPERATIVES!

https://www.thenation.com/article/what-the-us-government-is-not-telling-you-about-those-sonic-attacks-in-cuba/It seems extremely appropriate that CIA operatives in Cuba were the government employees targeted in the "sonic attacks". It is likely they got caught doing the same to Cuban officials and citizens by Cuban/Soviet intelligence. It's ironic how they make headlines being targeted and we suffer in silence. A small taste of their own medicine. They need a much larger dose.

 https://www.thenation.com/article/what-the-us-government-is-not-telling-you-about-those-sonic-attacks-in-cuba/

AR 2-2: THE DOCUMENT THAT GOVERNS THE CONDUCT OF THE CIA (IN THE UNITED STATES)

https://www.aclu.org/blog/national-security/privacy-and-surveillance/new-docs-raise-questions-about-cia-spying-here-home?page=1&redirect=blog/speak-freely/new-docs-raise-questions-about-cia-spying-here-home#comments-topblog-cia-500x280-v02.jpg The current debate about government surveillance has largely overlooked the CIA, possibly because we know little about the agency's activities within the United States. While the relevant legal authorities governing the CIA, including Executive Order 12333, set out the CIA's mandate, they do so in broad terms. Beyond the generalities in EO 12333 and other laws, the public has had few opportunities to examine the rules governing the CIA's activities. 

The Most Important Surveillance Order We Know Almost Nothing About.

https://www.aclu.org/blog/national-security/privacy-and-surveillance/new-docs-raise-questions-about-cia-spying-here-home?page=1&redirect=blog/speak-freely/new-docs-raise-questions-about-cia-spying-here-home#comments-topblog-cia-500x280-v02.jpg But we know more today than we did a few weeks ago. In response to a Freedom of Information Act lawsuit filed by the ACLU and Yale Law School's Media Freedom and Information Access Clinic, the CIA has released a slew of documents concerning CIA surveillance under EO 12333. (The Justice Department has also recently released a set of documents related to the executive order.)

The national debate in the 1970s about the proper limits of U.S. government spying on its own citizens was, to a large extent, about the CIA. In the wake of the Watergate scandal and news stories about other illegal CIA activity, President Gerald Ford and Congress launched investigations into the full range of CIA misdeeds — from domestic spying programs and infiltration of leftist organizations to experimentation on non-consenting human subjects and attempts to assassinate foreign leaders.


Although the CIA's legal authority to spy on Americans was very narrow, these investigative committees — chaired by Sen. Frank Church, Vice President Nelson Rockefeller, and Rep. Otis Pike — discovered that the CIA had engaged in a massive domestic spying project, "Operation CHAOS," which targeted anti-war activists and political dissenters. The committee reports also revealed that, for more than 20 years, the CIA had indiscriminately intercepted and opened hundreds of thousands of Americans' letters. In addition to documenting the intelligence agencies' extensive violations of the law, the Church Committee concluded that the constitutional system of checks and balances "has not adequately controlled intelligence activities."
The Church Committee's conclusion — at core, an admonition — still resonates today. While the documents that the CIA has released are heavily redacted, raising more questions than they answer, they strongly suggest that the agency's domestic activities are extensive.

Some highlights from the documents:

A key CIA regulation — titled "AR 2-2" — governs the conduct of the CIA's activities, which include domestic intelligence collection.
AR 2-2, which has never been publicly released before, includes rules governing a wide range of activities, including surveillance of U.S. persons, human experimentation, contracts with academic institutions, relations with journalists and staff of U.S. news media, and relations with clergy and missionaries.

Several annexes to AR 2-2 contain the agency's EO 12333 implementing procedures. For example, Annex A, "Guidance for CIA Activities Outside the United States," sets forth the procedures that apply to CIA activity directed toward U.S. citizens and permanent residents who are abroad. Much of the relevant information is redacted. Annex F, "Procedures Governing Conduct and Coordination by CIA and DEA of Narcotics Activities Abroad," is similarly redacted in key sections, including the section discussing the agencies' "Specific Agreement Concerning Electronic Surveillance."

The documents indicate that the CIA engages in a wide array of domestic activity, often in conjunction with the FBI.

https://www.aclu.org/blog/national-security/privacy-and-surveillance/new-docs-raise-questions-about-cia-spying-here-home?page=1&redirect=blog/speak-freely/new-docs-raise-questions-about-cia-spying-here-home#comments-topblog-cia-500x280-v02.jpg