1995 Maricopa County fake terror attack on train: Tension Tactics / #Arkancide

On his August 19, 1995 radio address, President Clinton complained that Congress still had not passed “his” Anti-Terrorism Bill. “It’s hard to imagine what more must happen to convince Congress to pass that bill,” Clinton warned, in the manner of an ominously veiled threat.

Then just two months later, on October 9, the nation witnessed its first attack on a passenger train, when Amtrak’s “Sunset Limited” was derailed while enroute from Phoenix to San Diego. The derailment, caused by sabotage, resulted in over 100 injuries, including one death.

The terrorists left behind a cryptic note, calling themselves the “Sons of the Gestapo.” The mainstream press quickly jumped on this latest “terrorist” attack, coming as it did only six months after the Oklahoma City bombing. While no one, including law-enforcement officials, had ever heard of the “Sons of the Gestapo,” the purveyors of deception immediately played it up as the obvious work of a “Right-wing” militia group.

FBI officials were more cautious however, speculating that the attack may have been the result of a “disgruntled employee.” Exhaustive searches through numerous data-bases revealed no group called “Sons of the Gestapo,” and only someone with the technical knowledge necessary to disable a warning system on a railroad track would be capable of executing such a stunt.

It may not have mattered however. In the aftermath of the Oklahoma City bombing, any such attack on American citizens would be excuse enough to push the Anti-Terrorism Bill through Congress. And the press and anti-militia activists such as the ADL and the SPLC were eager to jump on the militia connection. “Sons of the Gestapo,” they asserted, could only be the pseudonym for a Right-wing hate-group.

Yet law-enforcement officials had only an enigmatic message to guide them. The note left behind by the saboteurs rallied against the ATF and FBI for their actions at Waco and Ruby Ridge, and stated, “This is not Nazi Germany.”

Why anyone would attack a passenger train to exact revenge on government officials for killing innocent civilians (or blow up babies as revenge for killing children) is beyond credulity. Yet, as in the Oklahoma City case, this was the message that the saboteurs — and the government-controlled press — wanted us to believe. America was filled with hateful Right-wing extremists who would do anything — kill anyone, women, children, babies — to pursue their violent anti-government agenda.

As Attorney General Janet Reno announced in the Oklahoma City case, so the local U.S. Attorney, Janet Napolitano would declare: “We are going to pursue every bit of evidence and every lead very thoroughly… until we find the person or persons who committed this crime.”[1320]

While the FBI swarmed through Maricopa County, interrogating local residents and harassing the few isolated “desert rats” who inhabited the surrounding countryside, a real investigation was being conducted by a lone Maricopa County Sheriff. With the assistance of Craig Roberts, a retired Tulsa police officer with military intelligence experience who worked on the Oklahoma City investigation, the Sheriff was able to uncover some amazing information.

What they found was that other than rescue vehicles, there were no vehicle tracks entering or exiting the crash site. Moreover, the site itself was extremely remote, being near the summit of the rugged Gila Bend Mountains, which surrounded the site to the east, north, and west. It was there, along a sharp S-curve, that the perpetrators had pulled 29 spikes from the tracks, causing the fatal crash.

Why had the perpetrators chosen such a remote location, Roberts wondered? Had they picked a more accessible spot, he reasoned, it would have surely lessened their chances of being caught, as all they would have had to do was drive to the nearest highway. In this case, the nearest road was Highway 8, 38 miles away, necessitating a difficult drive over rugged terrain, at the same time as law-enforcement officers would surely be on a heightened state of alert.

What Roberts and his sheriff partner also discovered was that 90 minutes away by air, in Pinal County, was a mysterious air-base known as Marana. The locked-down facility was owned by Evergreen, Inc., a government contractor reportedly involved in drug smuggling during the Iran-Contra period. The base, located off of Highway 10 between Phoenix and Tucson, was the site of strange night-time training maneuvers involving black and unmarked military-type helicopters. Passersby had also witnessed black-clad troops dropping into the desert en mass, using steerable black “Paracommander” parachutes.
 
This began to raise some interesting possibilities. Had the perpetrators been dropped into the site by air, then picked up by chopper? Both Roberts and his colleague at the Sheriff’s Department were experienced military pilots. They observed that it would have been easy for a helicopter to fly low through the mountain passes, avoiding radar, and insert and extract a team. As Roberts noted, “A full moon, wind out of the south at 8 knots, and a clear sky… would be an ideal night for air operations.”[1321]
 
The possibilities of a covert paramilitary commando team being responsible for the attack raised more than a few eyebrows at the Maricopa County Sheriff’s Department, until they began investigating a lead provided by a sympathetic FBI agent that several hikers had seen a small group of parachuters drop into the desert that night. They also discovered the following information:
 
…a VFR target squawking 1200 that left Tri-City airfield in Albuquerque on a southwest course, climbed to 10,500 feet, then, when it was exactly due east of the Amtrak site, turn due west and flew a course line that took it one mile south of the site. But just before arriving over the site, it dropped to 8,500 feet. After crossing the target zone, it turned on a southwesterly course towards California at 8,500 feet. Albuquerque contacted the Los Angeles Center which tracked the aircraft to a landing at Montgomery Field in San Diego.… It crossed the valley south of the bridge at 1940 hours (7:40 p.m.)
 
Since the winds that night were at 8 knots out of the south, a drop one mile from the target site would compensate for wind drift. Moreover, such a flight is not required to file a flight plan listing its passengers, and an aircraft flying out of Albuquerque, squawking on transponder 1200 wouldn’t look particularly suspicious.
 
When they checked with the refueler at Montgomery Field, the records indicated that the “N” number checked to a Beachcraft, registered to Raytheon. Raytheon owns E-systems. Like Evergreen, E-Systems, based in Greenville, Texas, is a covert government contractor, reportedly involved in drug-running. The NSA contractor allegedly developed sophisticated systems to create electronic “holes” which would allow planes to cross the border without tripping the NORAD Early Warning Systems. E-Systems, which is reputed to have “wet-teams” (assassination teams), was directed by former NSA Director and CIA Deputy Director Bobby Ray Inman.
 
While it is possible a jump was made from the twin-engine Beechcraft, a plane commonly used for such purposes, it still left the problem of the team’s extraction. With the radar track information, the Maricopa Sheriff then went to the Air Force at Yuma, who monitor the Aerostat radar drug balloons. The DEA balloons have “look-down” capability for detecting low-flying aircraft. The Master Sergeant at Yuma agreed to help out. A short time later he called back.
 
“Sorry,” he said. “We can’t help you out.”
 
“What? Why?” asked Jack.
 
“The plug’s been pulled.”
 
“What does that mean?”
 
The sergeant sounded very uncomfortable when he replied. “We really wanted to check this out, but all I can say is the balloons were down that night.”
 
“Why?” asked Jack.
 
“Maintenance.”
 
“All of them?” asked Jack, incredulously.
 
“Yes, sir.” The sergeant sounded very nervous.
 
“Why?”
 
“All I can tell you is that they were ordered down for maintenance. It came from above my pay grade.”
 
One has to wonder what “above my pay grade” means. Why would all the balloons be ordered down for maintenance? Obviously, a cover-up was in progress.
 
It was beginning to sound suspiciously like the hurried demolition of the Oklahoma Federal Building, to prevent any independent forensic analysis of the bomb site. Or the Secret Service removing President Kennedy’s protective bubble from his limousine; failing to secure the windows and rooftops along the parade route; and changing the route at the last minute.
 
Like the two foregoing examples, only the government — or shadow elements within the government — had the capability of pulling that off. No “lone nut” or criminal syndicate could order such last-minute changes, or orchestrate such a massive and well-executed cover-up. Moreover, no militia group could order all the radar balloons down on the night of the attack.
 
As a Maricopa County resident stated to the Arizona Republic regarding the FBI’s so-called militia theory, “Buddy, you can’t get three people out here to get together on what kind of pickup to drive, and you think we’re going to form a militia?”
 
Obviously, no militia would benefit from such an attack. And what about the “Sons of the Gestapo?” As Roberts wrote: “…as an old Southeast Asia hand (a marine sniper during Vietnam), I remember that one of the terms used by Phoenix Program assassins working under MACV-SOG (Military Advisory Command, Studies and Observations Group) was a twisted bar-room version of the last acronym. “Yeah,” a drunk trooper would mention. “I’m SOG… a son of the Gestapo.”[1322]
 
The Phoenix assassination program, as previously discussed, was organized by the CIA’s William Colby, Ted Shackley, and fielded by General John Singlaub. Singlaub commanded Second Lieutenant Oliver North. Shackley, Singlaub, and North would go on to orchestrate the secret and illegal Iran-Contra operation, smuggling drugs into this country at such places as Mena, Arkansas… and Marana.[1323]
 
Curiously, whenever Iran-Contra drug shipments came in for the California run, the drug balloons under “Operation Watchtower” were shut down. Could this be the same mechanism that shut them down the night of the attack?
 
Then, in September of 1997, a confidential FBI memo intended for the U.S. Attorney’s Office in Phoenix was accidentally faxed to the Arizona Republic, the Associated Press, and other news media. The memo states that the FBI’s prime suspect is “a man with law enforcement and firefighting experience who recently moved out of Arizona.”[1324]
 
Apparently, the “Sons of the Gestapo” note left behind was a “false flag,” a distraction designed to serve a political purpose. In this case, that purpose — like the Oklahoma bombing which preceded it — was to connect the Amtrak attack with the Patriot/Militia movement. Considering the reaction of the mainstream press, it appears they have largely succeeded.

Governor Nikki Haley, Hillary Clinton, Glenn Beck, MSM, Brad Thor, Blame Trump Supporters For Violence…

“Stand your ground. Don’t fire unless fired upon, but if they mean to have a war let it begin here.” Captain John Paarker, to his Minute Men on Lexington Green, April 19, 1775.

…and so it begins again, in the colonial capital of California San Jose, home to Winchester House and an infesting army of mexican illegals.

What is happening is irreversible and perhaps we shouldn’t wish it reversed.

Montani Semper Liberi

The Gentleperson’s Guide to Forum Spies

What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups.  A veritable how-to manual for Forum Trolls and Hijackers.It is supposedly derived from an Government document on Counter-Intelligence Professional (COINTELPRO) techniques used by the FBI and other Intelligence agencies.  It’s been posted to Slashdot several times, and repeatedly disappears.  (See http://cryptome.org/…)  Interested to see if/how long it stays up on Kos.

What follow is a partial excerpt of the article, which can be found in full at: http://cryptome.org/…

The Gentleperson’s Guide To Forum Spies (spooks, feds, etc.)http://pastebin.com/…

1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression
_____________________________

COINTELPRO Techniques for dilution, misdirection and control of a internet forum..

There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a ‘uncontrolled forum.’

Technique #1 – ‘FORUM SLIDING’

If a very sensitive posting of a critical nature has been posted on a forum – it can be quickly removed from public view by ‘forum sliding.’ In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to ‘age.’ Each of these misdirectional forum postings can then be called upon at will to trigger a ‘forum slide.’ The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a ‘forum slide’ and ‘flush’ the critical post out of public view it is simply a matter of logging into each account both real and fake and then ‘replying’ to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting ‘slides’ down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 – ‘CONSENSUS CRACKING’

A second highly effective technique (which you can see in operation all the time at http://www.abovetopsecret.com) is ‘consensus cracking.’ To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made – but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger ‘evidence’ or disinformation in your favour is slowly ‘seeded in.’ Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then ‘abort’ the consensus cracking by initiating a ‘forum slide.’

Technique #3 – ‘TOPIC DILUTION’

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a ‘RESOURCE BURN.’ By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a ‘gossip mode.’ In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to ‘drive in the wedge.’ By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 – ‘INFORMATION COLLECTION’

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a ‘show you mine so me yours’ posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your ‘favourite weapon’ and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite ‘technique of operation.’ From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 – ‘ANGER TROLLING’

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes – without the requirement to ‘stage’ a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to ‘lead’ the forum by replying to your own posting with your own statement of violent intent, and that you ‘do not care what the authorities think!!’ inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 – ‘GAINING FULL CONTROL’

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings – and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the ‘ultimate victory’ as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a ‘honey pot’ gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.
_
____________________________

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

4. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name calling and ridicule. This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news. A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.

16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.

17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Originally posted to railsplitter on Sat Jul 21, 2012 at 09:54 PM PDT.

Also republished by Extraterrestrial Anthropologists.

#MH17 : after the lapdog media beatup, normal things keep happening

Despite the CIA / NSA / DISC narrative about the eeevilll Russians, eeeevillll Putin, eevillll rebels, etc. what has actually happened:

Local third world poor Ukraineans have searched the wreckage, stolen some stuff, retrieved all the bodies, preserved the black boxes, kept the CIA assets of OSCE away and sent the bodies to Holland.

There’s no proof the rebels shot MH17 down. There never will be.

The Ukraine government, a wholly owned subsidiary of international mafia, have suppressed all evidence of their own involvement- jets intercepting MH17, their own missile batteries, shipment of rockets from Finland, who paid who, Khazanah Bank assets being present in Ukraine prior to event.

Odds of two planes from the same airline, which is an airline with exceptional losses, being involved in two fatal mass casualty incidents within 140 days: “mind-boggling”.

Unless you were being pressured by governments, intel agencies, international mafia etc. what would YOU do if you were the insurer?

Exactly.

Cui bono?

 

 

DISC, side FiVe: barry soetoro and the American color revolution

What was being shown on television was no longer the standard coverage of a normal political campaign, but rather a propaganda exercise within the framework of a CIA covert operation.

The controlled corporate media wanted Obama nominated by accolade, by acclamation, by the mob of swarming adolescents. He was being offered not a public office but a crown — better yet, an apotheosis. For the media whores, the reign of the new Messiah was beginning.

http://www.american-buddha.com/lit.obama.webster.intro.htm

Just as the decade from 2004 (Ukraine colour revolution) to 2014 (Ukraine plutocrat coup) has destroyed Ukraine, we are entitled to ask what the color revolution in America led by barry soetor aka Obama will lead to. 2008 is the equivalent in America of 2004 in the Ukraine (and one can look at the other fake revolutions that CIA has carried out via sponsors and proxies after thorough training in its secret schools).

That barry soetoro is a classic sheep dipped fake is beyond any question. It’s in the same category of documented fact as so many other things the lapdog media ignore. That isn’t the subject of this thesis. This thesis is directing attention at what the pattern of color revolutions is intended to achieve.

Perfecting The Method of "Color Revolutions"

In 1985, a social scientist, Gene Sharp, published a study commissioned by NATO on Making Europe Unconquerable. He pointed out that ultimately a government only exists because people agree to obey it. The USSR could never control Western Europe if people refused to obey Communist governments.

A few years later, in 1989, Sharp was tasked by the CIA with conducting the practical application of his theoretical research in China. The United States wanted to topple Deng Xiaoping in favor of Zhao Ziyang. The intention was to stage a coup with a veneer of legitimacy by organizing street protests, in much the same way as the CIA had given a popular facade to the overthrow of Mohammed Mossadegh by hiring Tehran demonstrators (Operation Ajax, 1953). The difference here is that Gene Sharp had to rely on a mix of pro-Zhao and pro-US youth to make the coup look like a revolution. But Deng had Sharp arrested in Tiananmen Square and expelled from the country. The coup failed, but not before the CIA spurred the youth groups into a vain attack to discredit Deng through the crackdown that followed. The failure of the operation was attributed to the difficulties of mobilizing young activists in the desired direction.

Ever since the work of French sociologist Gustave Le Bon in the late nineteenth century, we know that adults behave like children when they are in the throes of collective emotion. They become susceptible, even if for just a critical fleeting moment, to the suggestions of a leader-of-men who for them embodies a father figure. In 1990, Sharp got close to Colonel Reuven Gal, then chief psychologist of the Israeli Army (he later became deputy national security adviser to Ariel Sharon and now runs operations designed to manipulate young Israeli non-Jews). Combining the discoveries of Le Bon and Sigmund Freud, Gal reached the conclusion that it was also possible to exploit the “Oedipus complex” in adolescents and steer a crowd of young people to oppose a head of state, as a symbolic father figure.

On this basis, Sharp and Gal set up training programs for young activists with the objective of organizing coups. After a few successes in Russia and the Baltics, it was in 1998 that Gene Sharp perfected the method of “color revolutions” with the overthrow of Serbian President Slobodan Milosevic.

After President Hugo Chavez foiled a coup in Venezuela on the basis of one of my investigations revealing the role and method of Gene Sharp, the latter suspended the activities of the Albert Einstein Institute which served as a cover and went on to create new structures (CANVAS in Belgrade, the Academy of Change in London, Vienna and Doha). We saw them at work the world over, especially in Lebanon (Cedar Revolution), Iran (Green Revolution), Tunisia (Jasmine Revolution) and Egypt (Lotus Revolution). The principle is simple: exacerbate all underlying frustrations, blame the political apparatus for all the problems, manipulate the youth according to the Freudian “patricidal” scenario, organize a coup, and then propagandize that the government was brought down by the “street.”

http://www.globalresearch.ca/perfecting-the-method-of-color-revolutions/32261

Colored Revolutions: A New Form of Regime Change, Made in the USA

This article was first published October 11,2011.

In 1983, the strategy of overthrowing inconvenient governments and calling it “democracy promotion” was born.

Through the creation of a series of quasi-private “foundations”, such as Albert Einstein Institute (AEI), National Endowment for Democracy (NED), International Republican Institute (IRI), National Democratic Institute (NDI), Freedom House and later the International Center for Non-Violent Conflict (ICNC), Washington began to filter funding and strategic aid to political parties and groups abroad that promoted US agenda in nations with insubordinate governments.

Behind all these “foundations” and “institutes” is the US Agency for Inter- national Development (USAID), the financial branch of the Department of State. Today, USAID has become a critical part of the security, intelligence and defense axis in Washington. In 2009, the Interagency Counterinsurgency Initiative became official doctrine in the US. Now, USAID is the principal entity that promotes the economic and strategic interests of the US across the globe as part of counterinsurgency operations. Its departments dedicated to transition initiatives, reconstruction, conflict management, economic development, governance and democracy are the main venues through which millions of dollars are filtered from Washington to political parties, NGOs, student organizations and movements that promote US agenda worldwide. Wherever a coup d’etat, a colored revolution or a regime change favorable to US interests occurs, USAID and its flow of dollars is there.

How Does a Colored Revolution Work?

The recipe is always the same. Student and youth movements lead the way with a fresh face, attracting others to join in as though it were the fashion, the cool thing to do. There’s always a logo, a color, a marketing strategy. In Serbia, the group OTPOR, which led the overthrow of Slobodan Milosevic, hit the streets with t-shirts, posters and flags boasting a fist in black and white, their symbol of resistance. In Ukraine, the logo remained the same, but the color changed to orange. In Georgia, it was a rose-colored fist, and in Venezuela, instead of the closed fist, the hands are open, in black and white, to add a little variety.

Colored revolutions always occur in a nation with strategic, natural resources: gas, oil, military bases and geopolitical interests. And they also always take place in countries with socialist-leaning, anti-imperialist governments. The movements promoted by US agencies in those countries are generally anti-communist, anti-socialist, pro-capitalist and pro-imperialist.

Protests and destabilization actions are always planned around an electoral campaign and process, to raise tensions and questions of potential fraud, and to discredit the elections in the case of a loss for the opposition, which is generally the case. The same agencies are always present, funding, training and advising: USAID, NED, IRI, NDI, Freedom House, AEI and ICNC. The latter two pride themselves on the expert training and capacitation of youth movements to encourage “non violent” change.

The strategy seeks to debilitate and disorganize the pillars of State power, neutralizing security forces and creating a sensation of chaos and instability. Colonel Robert Helvey, one of the founders of this strategy and a director at AEI, explained that the objective is not to destroy the armed forces and police, but rather “convert them” — convince them to leave the present government and “make them understand that there is a place for them in the government of tomorrow”. Youth are used to try and debilitate security forces and make it more difficult for them to engage in repression during public protests. Srdja Popovic, founder of OTPOR, revealed that Helvey taught them “. . . how to select people in the system, such as police officers, and send them the message that we are all victims, them and us, because it’s not the job of a police officer to arrest a 13-year old protestor, for example. . . .”

It’s a well-planned strategy directed towards the security forces, public officials and the public in general, with a psychological warfare component and a street presence that give the impression of a nation on the verge of popular insurrection.

http://www.globalresearch.ca/colored-revolutions-a-new-form-of-regime-change-made-in-the-usa/27061

One very important strand of the color revolution process, and one that establishes the true nature and meaning of an earlier tragedy, is the similarity between the soft weapon experimentation in Jonestown and the modern “Obama” phenomenon.

Occasionally, anit-Obama activists have identified a disturbing similarity between “drinking the kool aid” and the sinister mind control mobilised on behalf of barry soetoro- his framing in pictures complete with halo, the lapdog media’s perennial coverups for him, the Stalinist myth of his intellect, and the total obliteration of his past.

Most opponents of his regime don’t understand that it is NOT “his” regime. He is a marxist puppet, raised from obscurity to be the public face of the left hand of the intelligence agency control system. But the left-right dichotomy is itself a nonsense of course. Whether it’s the homey small town values veneer used by Nixon and Reagan or the liberal feel good yippie vibes of “Obama”, what is being seen is incremental irreversible change, begun by the wholesale embrace of Mao’s Little Red Book in the Pentagon of the 1950s. This marxist hand of the control system is in opposition to the reactionary forces of the white anglo-saxon establishment that controlled America until the 1950s, after which forced power sharing between the metastasizing israeli network and the old guard melded a new power elite, in much the same way merchant classes have always forced their way in to the ranks of aristocracies- and with the traditional dreadful results.

The American color revolution is going to achieve fundamental change, irreversible change, to America. Just as in all the other countries where a color revolution has occurred.

 

It’s not so much what they say as why they say it…

“If you have got any connections whatsoever between the computing systems, you can jump across and you can get into the flight critical ­system.

“To really protect your computer systems, you do not let anything ­connect with them and you would keep the inflight systems totally in their own loop so nothing whatsoever connects.

“There are now a number of ways, however, in which the gap between those systems and a handheld device like a mobile phone can be overcome.”

Last April, German security consultant Hugo Teso, who is also a commercial pilot, unveiled a way to hijack a plane remotely using a phone.

Addressing the Hack In The Box security summit in Amsterdam, he said he had spent three years dev­eloping a series of malicious codes on a mobile phone app called PlaneSploit that hacked into an aircraft’s security system.

With the cream of the global intelligence community, America’s huge satellite arsenal and 14 different nations now involved in the search for the missing plane, there is also a growing belief that answers to many of the questions might lie in the private world of 53-year-old pilot Zaharie Ahmad Shah. Police have been standing guard outside the father-of-three’s home since the flight vanished but yesterday saw the first extensive search inside.

Diaries, personal papers, computer files and the flight simulator that Captain Zaharie had built himself, and which he had proudly shown off on the internet, will all undergo detailed forensic analysis. Any data held on the simulator’s computer might give an indication whether the pilot had planned a trial run of events prior to the ill-fated flight to Beijing.

http://www.express.co.uk/news/world/465126/Missing-Malaysia-Airlines-plane-may-have-been-cyber-hijacked-using-mobile-phone

ISIS – a new pretend enemy

ISIS has no more reality than Al QaEDA.

 

Al Qaeda was a fiction, with a name that meant “database” or “western style toilet”. It was a nickname for a list of agents and contacts in the islamic world for CIA – a list of assets for black ops.

When this was becoming more widely known lapdog media tools started trying to change the spelling to al qaida so the data on al qaeda could be disappeared down the memory hole. This was done successfully with the abbreviation for Osama- originally intel agencies called him UBL, this was changed to OBL. And at one stroke the public data on UBL was harder to find, at least for normal civilian amateur researchers.

Now here we go again. Following in the proud tradition of Islamic Terror Group (does anyone think the clowns being manipulated actually called themselves that?) and Al Qaeda, now we have ISIS.

Firstly, no observant muslim would call any organisation ISIS, they would well know that this is the name of an ancient egyptian goddess. Secondly, isn’t it convenient that an American-style acronym that the lapdog media love to use is the label by which a local regional ethnic groups struggle for nationbuilding will now be known under?

It’s also convenient that all the guantanamo alumni set free by barry soetoro are heading up the fictional entities across the world, too.

ImageWhite Noise by Graham Dean

%d bloggers like this: